Threat IntelHIGH

Axios NPM Supply Chain Attack - Malicious Releases Detected

Featured image for Axios NPM Supply Chain Attack - Malicious Releases Detected
WIWiz Blog
axiosnpmsupply chain attackplain-crypto-jstrojan
🎯

Basically, hackers took control of a package used by many developers to spread harmful software.

Quick Summary

A supply chain attack compromised the npm account of axios, leading to malicious releases. This incident affects numerous environments, urging immediate audits and security measures. Stay alert to protect your development workflows.

The Threat

On March 31, 2026, a significant supply chain attack was reported involving the npm account of an axios maintainer. An unknown threat actor compromised this account and published two malicious versions of the axios package, specifically v1.14.1 and v0.30.4. These versions included a dangerous dependency on a trojanized package called plain-crypto-js. Although the malicious packages were removed shortly after their release, the rapid adoption of axios—used in about 80% of cloud and code environments—led to widespread exposure. Reports indicate that these compromised versions executed in approximately 3% of affected environments.

The malicious packages contained a dropper script that downloaded and executed platform-specific payloads from a command-and-control (C2) server. This attack exemplifies the vulnerabilities inherent in supply chain security, where a single compromised account can lead to extensive damage across multiple organizations.

Who's Behind It

The attack was orchestrated by an unknown threat actor who gained access to the maintainer's npm account. Once inside, they published the malicious versions of axios, which quickly spread due to the package's popularity. The malicious payloads varied depending on the operating system, with distinct implementations for macOS, Windows, and Linux. Each variant was designed to establish remote access and execute commands from the C2 server.

The attacker’s choice of a widely used package like axios highlights a common tactic in supply chain attacks: targeting popular tools to maximize impact. The use of a trojanized dependency further complicates detection efforts, as it can blend in with legitimate software updates.

Tactics & Techniques

The malicious axios packages introduced a dependency on plain-crypto-js, which acted as a trojan. This trojan facilitated the download of additional payloads tailored for each operating system. For instance, the macOS version was a compiled binary capable of self-signing, while the Windows variant used a PowerShell script to maintain persistence. The Linux payload was delivered as a Python script.

Organizations that downloaded these malicious versions should be vigilant. The payloads not only executed commands but also communicated with the C2 server every 60 seconds, transmitting system information and awaiting further instructions. This behavior can lead to significant data breaches if not addressed promptly.

Defensive Measures

Organizations are urged to take immediate action in response to this incident. Here are key steps to mitigate the risk:

  1. Audit axios usage: Identify if the affected versions were downloaded or executed in your environment. Remove any malicious artifacts from your systems.
  2. Rotate exposed credentials: If there is any indication of execution, assume that credentials may have been compromised. Scan for secrets and rotate them accordingly.
  3. Investigate potential compromise paths: Review build pipelines and developer machines for signs of unauthorized access.
  4. Monitor for suspicious activity: Track outbound connections to the C2 server and analyze logs for any unusual behavior.

By implementing these measures, organizations can better protect themselves against similar supply chain attacks in the future.

🔒 Pro insight: Analysis pending for this article.

Original article from

WIWiz Blog
Read Full Article

Related Pings

HIGHThreat Intel

External Pressures Redefine Cybersecurity Risk Landscape

Organizations are facing unprecedented cybersecurity risks from third-party vendors and geopolitical tensions. These factors are reshaping the threat landscape, demanding proactive strategies. It's crucial to prepare for potential breaches and invest in resilience.

CSO Online·
HIGHThreat Intel

TeamPCP - Investigating Post-Compromise Attacks in Cloud

TeamPCP is exploiting stolen secrets from recent supply chain attacks to compromise cloud environments. Their rapid actions pose significant risks to affected organizations. Stay informed and secure your systems against these threats.

Wiz Blog·
HIGHThreat Intel

Phishing Campaign - Odd Malware Installations Observed

A phishing campaign has led to the installation of RMM tools across over 80 organizations. This ongoing threat may indicate an access-as-a-service model. Immediate vigilance is required.

Sophos News·
HIGHThreat Intel

Cybercrime Investigation - 130 Companies Targeted in Germany

German authorities have identified two suspects behind cyberattacks on 130 companies. The attacks caused massive financial losses, totaling around 35 million euros. This ongoing threat highlights the need for enhanced cybersecurity measures across industries.

CSO Online·
HIGHThreat Intel

Axios NPM Packages Compromised in Major Supply Chain Attack, Widespread Execution Observed

A major supply chain attack has compromised Axios NPM packages, leading to the injection of malicious code and widespread execution across environments. Immediate action is required from developers and organizations.

Cyber Security News·
HIGHThreat Intel

PwC Report - Identity Compromise Fuels Supply Chain Attacks

PwC's report reveals that identity compromise is a major entry point for cyber attackers. AI enhances phishing tactics, making it crucial for organizations to strengthen their defenses. Understanding these threats can help protect sensitive data and systems.

SC Media·