Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

876+ Articles
122+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. 1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, and Intercom
1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, and Intercom
NEWS

1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, and Intercom

The TeamPCP threat group's Mini Shai-Hulud supply chain campaign compromised SAP-related npm packages along with PyTorch Lightning and Intercom client libraries, poisoning packages with a combined monthly download count of nearly 10 million and impacting 1,800 organizations.

Dylan H.

News Desk

May 1, 2026
4 min read

The TeamPCP threat group's ongoing Shai-Hulud supply chain attack campaign has claimed another wave of victims. A newly disclosed "Mini Shai-Hulud" operation targeted SAP-related npm packages, PyTorch Lightning, and Intercom client libraries — a combined set of packages downloaded nearly 10 million times per month — compromising approximately 1,800 organizations in the process.

What Is the Shai-Hulud Campaign?

Shai-Hulud is an extended supply chain attack operation attributed to TeamPCP, a threat group that has been active across multiple high-profile incidents in 2026. The campaign takes its name from the enormous sandworm creatures in Frank Herbert's Dune — a reference to the way the attacks tunnel silently through the software supply chain before surfacing to strike.

Previous Shai-Hulud operations targeted developer tooling, security scanning infrastructure, and CI/CD pipelines. The "Mini" designation for this latest wave reflects a more targeted scope compared to earlier, broader operations — but the impact remains significant given the download volumes of the affected packages.

Compromised Packages

The attack poisoned three distinct npm package ecosystems:

SAP npm Packages SAP-related npm libraries used for integration with SAP enterprise systems were among those compromised. These packages are common in enterprise environments running SAP ERP, S/4HANA, or related SaaS products, giving attackers access to high-value corporate environments.

PyTorch Lightning PyTorch Lightning is a widely-used machine learning framework built on top of PyTorch, popular in research and production AI/ML pipelines. Compromising it exposes both research institutions and commercial AI teams.

Intercom Client The Intercom client library is used by SaaS companies to embed customer messaging functionality into their products. Poisoning it gives attackers a foothold in the environments of both the companies using Intercom and potentially their end customers.

Together, the three package sets represent a monthly download volume of nearly 10 million installs — meaning malicious versions, even if live for a short window, could have propagated widely before detection.

Attack Methodology

As with other Shai-Hulud operations, TeamPCP likely compromised the npm accounts of maintainers through credential theft or social engineering, then published malicious versions of legitimate packages. The malicious versions include credential-stealing implants that exfiltrate authentication tokens, API keys, and environment secrets from build pipelines and developer machines where the packages are installed.

The attack follows a now-established playbook:

  1. Compromise maintainer credentials via phishing or credential stuffing
  2. Publish malicious package versions that appear legitimate
  3. Harvest secrets from CI/CD pipelines, developer machines, and cloud environments that install the package
  4. Establish persistence in compromised environments for follow-on attacks

Scale of Impact

Approximately 1,800 organizations are believed to have installed one or more of the compromised package versions. Given the enterprise nature of SAP integrations and the wide adoption of Intercom, victims likely span multiple sectors including finance, healthcare, SaaS, and manufacturing.

This incident follows the earlier April 2026 SAP-related supply chain attack — reported on CosmicBytez Labs as the TeamPCP Mini Shai-Hulud SAP packages story — confirming that the group continues to refine and expand its targeting of enterprise software supply chains.

Detection and Response

Organizations should immediately:

  1. Audit npm lock files — Check package-lock.json or yarn.lock for affected package versions published after suspicious dates
  2. Rotate all secrets — Any credentials, tokens, or API keys accessible from environments where these packages were installed should be considered compromised and rotated immediately
  3. Review CI/CD logs — Look for unexpected outbound network connections or data exfiltration from build pipelines
  4. Pin package versions — Until the situation is fully resolved, pin to known-good versions and verify checksums against trusted sources
  5. Enable npm audit — Run npm audit and cross-reference against published advisories for the affected packages

Broader Supply Chain Security Concerns

The Mini Shai-Hulud operation is the latest in a year of escalating supply chain attacks targeting the npm ecosystem. From the Axios npm compromise linked to North Korean threat actors in early April, to the PyTorch Lightning and Intercom poisonings disclosed today, the pattern is clear: the software supply chain is a primary attack surface in 2026.

Organizations relying on open-source packages — which is to say, virtually all modern software teams — must invest in dependency auditing, package integrity verification, and rapid secret rotation capabilities as baseline security practices.

Sources

  • SecurityWeek — 1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom
#Supply Chain#npm#SAP#PyTorch#Intercom#TeamPCP#Credential Theft#SecurityWeek

Related Articles

TeamPCP Hits SAP npm Packages With 'Mini Shai-Hulud' Supply Chain Attack

The threat actor TeamPCP has compromised multiple npm packages tied to SAP's cloud application development ecosystem in a new supply chain campaign dubbed 'Mini Shai-Hulud,' broadening their ongoing series of infrastructure-targeting attacks.

4 min read

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

Security researchers have uncovered a coordinated supply chain attack campaign dubbed 'mini Shai-H' targeting SAP-related npm packages, injecting credential-stealing malware that puts enterprise development pipelines at risk.

4 min read

PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials

Threat actors compromised the popular Python PyPI package 'Lightning' — used for PyTorch model training — pushing malicious versions 2.6.2 and onward to steal developer and CI/CD credentials. The Intercom-client package was also targeted in the same campaign.

6 min read
Back to all News