<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Looks like we have another #supplychain attack underway, this time facing #SAP-related NPM packages.]]></title><description><![CDATA[<p>Looks like we have another <a href="https://infosec.exchange/tags/supplychain" rel="tag">#<span>supplychain</span></a> attack underway, this time facing <a href="https://infosec.exchange/tags/SAP" rel="tag">#<span>SAP</span></a>-related NPM packages.</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://discourse.ifin.network/t/sap-npm-packages-targeted-with-credential-stealing-malware/340" title="SAP npm Packages targeted with Credential-stealing Malware">
<img src="https://discourse.ifin.network/uploads/default/optimized/1X/03c7802106d04e87f430dda8176cd94f630cc08d_2_1024x590.jpeg" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://discourse.ifin.network/t/sap-npm-packages-targeted-with-credential-stealing-malware/340">
SAP npm Packages targeted with Credential-stealing Malware
</a>
</h5>
<p class="card-text line-clamp-3">So far, four SAP-related npm packages have been compromised where the preinstall scripts inject malicious preinstall hooks that bootstrap the Bun JavaScript runtime and executes an obfuscated credential stealer payload (…</p>
</div>
<a href="https://discourse.ifin.network/t/sap-npm-packages-targeted-with-credential-stealing-malware/340" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://discourse.ifin.network/uploads/default/optimized/1X/ea367a05f4a0d090bf61d140dc84f744c9ab9bf0_2_32x32.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />





<p class="d-inline-block text-truncate mb-0">IFIN <span class="text-secondary">(discourse.ifin.network)</span></p>
</a>
</div><p></p><p><a href="https://infosec.exchange/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" rel="tag">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/IFIN" rel="tag">#<span>IFIN</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/206a9507-ae4f-412a-82ee-e59095d29aea/looks-like-we-have-another-supplychain-attack-underway-this-time-facing-sap-related-npm-packages.</link><generator>RSS for Node</generator><lastBuildDate>Thu, 30 Apr 2026 14:30:20 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/206a9507-ae4f-412a-82ee-e59095d29aea.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 29 Apr 2026 16:25:36 GMT</pubDate><ttl>60</ttl></channel></rss>