A Mini Shai-Hulud Targeting the SAP Ecosystem

The post A Mini Shai-Hulud Targeting the SAP Ecosystem appeared first on GitGuardian Blog – Take Control of Your Secrets Security.
This attack is still active. Repository count grew from 847 to 1,006 while writing this analysis.

[…Keep reading]

[un]prompted 2026 – Total Recon: How We Discovered 1000s Of Open Agents In The Wild

[un]prompted 2026 – Total Recon: How We Discovered 1000s Of Open Agents In The Wild

The post A Mini Shai-Hulud Targeting the SAP Ecosystem appeared first on GitGuardian Blog – Take Control of Your Secrets Security.

This attack is still active. Repository count grew from 847 to 1,006 while writing this analysis. We expect it to keep on growing in the next few hours.

Earlier today, Aikido researchers detected multiple compromised Node.js packages in SAP’s namespace today. The malware adapts to CI environments, steals GitHub personal access tokens, and uses them to self-propagate—a pattern consistent with recent supply-chain attacks.
How it works

Credential harvesting: The payload reads CI environment variables and adjusts its behavior accordingly.
Token exfiltration: If a GitHub personal access token (ghp_) is found locally, the malware exfiltrates encrypted secrets to the corresponding GitHub account.
Fallback mechanism: If no token is present, the malware scans commit messages for the string ‘OhNoWhatsGoingOnWithGitHub:’, then decodes a double-base64-encoded payload hidden inside, and uses it to exfiltrate the encrypted secrets to this account.

The RSA keys used to encrypt the exfiltrated secrets are the same as the ones used last week in the @bitwarden/cli attack.
Exfiltration infrastructure
GitGuardian identified 7 commits containing exposed ghp_ tokens—all remain valid and active at 16h46 EST. The attacker used the stolen tokens to create public repositories, each named with Dune-themed keywords. Inside each repository:

A README.md file containing the string “A Mini Shai-Hulud has Appeared”
A results/ directory with a JSON file holding the encrypted payload, protected by a 4096-bit RSA key

Our telemetry shows the attack’s full scope:

23 GitHub accounts used for exfiltration
971 public repositories created with stolen tokens
Top 6 accounts created 936 repos (96%) — these are the accounts tied to the 7 compromised tokens

*** This is a Security Bloggers Network syndicated blog from GitGuardian Blog – Take Control of Your Secrets Security authored by Guillaume Valadon. Read the original post at: https://blog.gitguardian.com/a-mini-shai-hulud-targeting-the-sap-ecosystem/

About Author

What do you feel about this?

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.