Threat IntelHIGH

Axios NPM Packages Compromised in Major Supply Chain Attack

Featured image for Axios NPM Packages Compromised in Major Supply Chain Attack
CSCyber Security News+1 more
Axiosnpmsupply chain attackmalicious codeplain-crypto-jsmalwarecybersecurityJavaScript
🎯

Hackers found a way to sneak bad code into a popular tool used by many websites. They did this by pretending to be the real developers and changing the tool without anyone noticing. Now, anyone using the affected versions of this tool could be in danger, so it's important for developers to check their tools and remove any bad versions quickly.

Quick Summary

Axios, a popular HTTP client, has been compromised in a supply chain attack, leading to the injection of malicious code through unauthorized npm packages.

A sophisticated supply chain attack has targeted Axios, one of the most heavily adopted HTTP clients within the JavaScript ecosystem, by introducing a malicious transitive dependency into the official npm registry. Serving as a critical component across frontend frameworks, backend microservices, and enterprise applications, Axios records approximately 83 million weekly downloads on npm. The compromise involves the unauthorized publication of new Axios versions that automatically pull in plain-crypto-js@4.2.1, a newly published package confirmed by automated malware detection systems to contain malicious code. Because of the widespread integration of Axios in modern web development, the potential blast radius of this supply chain poisoning is exceptionally broad, necessitating immediate incident response protocols from downstream users.

The threat actors executed this attack by breaking from the project’s standard release patterns. Typically, Axios maintainers publish tagged releases on GitHub concurrently with their npm publishes. However, the compromised npm versions do not appear in the project’s official GitHub repository tags. At the time of the incident, v1.14.0 remained the most recent visible tag on GitHub, indicating that the malicious updates were pushed directly to the npm registry outside of the normal deployment pipeline. This bypass of standard version control suggests a highly coordinated effort to inject malicious code silently.

The malicious payload dependency, plain-crypto-js@4.2.1, was published to the registry on March 30, 2026, at 23:59:12 UTC. Within minutes of this publication, the compromised Axios versions were pushed live. Automated malware detection by Socket flagged the anomalous plain-crypto-js package shortly after at 00:05:41 UTC on March 31, highlighting the rapid execution sequence designed to maximize infection before security tools could react. To evade immediate detection during the initial infection phase, the attackers introduced minimal alterations to the primary Axios codebase. The sole modification was adding the malicious plain-crypto-js package to the dependency tree. Utilizing small, targeted changes is a conventional and highly effective tactic in supply chain attacks. This approach allows threat actors to execute arbitrary code through transitive dependencies while avoiding the scrutiny that typically accompanies large codebase modifications or logic changes.

Investigations into the registry logs reveal that the malicious package is associated with the npm publisher account jasonsaayman. This account's involvement in the compromised dependency chain raises significant concerns regarding unauthorized package publishing capabilities, pointing toward a potential account takeover, compromised developer credentials, or a hijacked session token that allowed the attackers to authenticate and publish the malicious artifacts directly to the npm registry.

Security teams, DevOps engineers, and developers must immediately audit their software supply chains to identify and remove the compromised components. Project maintainers should thoroughly review project lockfiles, dependency graphs, feature branches, and open pull requests for any exposure to the affected versions. Compromised Package Version Malicious Dependency:

  • Axios 1.14.1: plain-crypto-js@4.2.1
  • Axios 0.30.4: plain-crypto-js@4.2.1
  • plain-crypto-js 4.2.1: Primary Malicious Payload

If any of these specific package versions are detected within your environment, it is imperative to remove them entirely or roll back your dependencies to a known safe release, such as Axios 1.14.0, to prevent the execution of the injected code. As this remains an active and rapidly developing security incident, ongoing threat hunting and continuous monitoring are necessary to determine the full scope of the compromise and prevent further exploitation.

The rapid execution of this attack, coupled with the use of a legitimate npm publisher account, underscores the evolving tactics of threat actors in supply chain attacks. Organizations must enhance their dependency management practices and implement stricter controls over package publishing to mitigate such risks.

Original article from

CSCyber Security News· Guru Baran
Read Full Article

Also covered by

CYCyber Security News

Axios NPM Packages Compromised to Inject Malicious Codes in an Active Supply Chain Attack

Read Article

Related Pings

HIGHThreat Intel

PwC Report - Identity Compromise Fuels Supply Chain Attacks

PwC's report reveals that identity compromise is a major entry point for cyber attackers. AI enhances phishing tactics, making it crucial for organizations to strengthen their defenses. Understanding these threats can help protect sensitive data and systems.

SC Media·
HIGHThreat Intel

TeamPCP Threat Escalates - Ransomware Pivot Confirmed

TeamPCP has paused its supply chain attacks but is now pivoting to ransomware. This shift poses a significant threat to previously affected companies. Organizations must enhance their security measures to defend against this evolving risk.

Help Net Security·
HIGHThreat Intel

TA446 Hackers Deploy DarkSword Exploit Kit Against iOS Users

TA446 has launched a new campaign using the DarkSword exploit kit to target iOS users. This shift in tactics raises concerns about credential theft. Users are urged to stay vigilant against suspicious emails and keep their devices updated.

Cyber Security News·
HIGHThreat Intel

TeamPCP Supply Chain Campaign - Latest Developments Explained

The TeamPCP supply chain campaign has escalated, with Databricks investigating a compromise and AstraZeneca's data leaked. Organizations need to be aware of this evolving threat and take action to protect themselves.

SANS ISC·
HIGHThreat Intel

Telecom Sleeper Cells - Threat Actors Emerge in New Places

This week, multiple cyber threats emerged, including critical vulnerabilities and state-sponsored attacks. Key players like Red Menshen and GlassWorm are evolving their tactics. Organizations must act quickly to mitigate risks and protect sensitive data.

The Hacker News·
HIGHThreat Intel

Threat Intelligence Report - Key Cyber Attacks Revealed

This week's threat intelligence report reveals significant breaches, including the FBI director's Gmail hack. Cybersecurity is more critical than ever as attacks escalate, affecting various sectors.

Check Point Research·