Threat IntelHIGH

Axios npm Supply Chain Attack - Mitigation Steps Explained

Featured image for Axios npm Supply Chain Attack - Mitigation Steps Explained
MSMicrosoft Security Blog
AxiosSapphire Sleetnpmmalwaresupply chain attack
🎯

Basically, bad software was added to Axios, putting many users at risk.

Quick Summary

Axios experienced a serious supply chain attack linked to North Korea's Sapphire Sleet. Countless users who downloaded the malicious npm packages are at risk. Immediate actions are necessary to secure affected systems and prevent further exploitation.

What Happened

On March 31, 2026, a significant supply chain compromise was discovered involving the popular HTTP client Axios. Two new npm packages, versions 1.14.1 and 0.30.4, were found to contain malicious code that connected to a command and control (C2) server. This attack was attributed to Sapphire Sleet, a North Korean state actor known for targeting financial sectors and cryptocurrency. The malicious packages were designed to download a second-stage remote access trojan (RAT) based on the operating system of the infected device.

The attack follows a troubling trend in cybersecurity where adversaries poison widely-used open-source frameworks. This method allows them to achieve broad impacts across many organizations. The Axios packages are particularly concerning due to their widespread use, with over 70 million downloads weekly. Users who installed these compromised versions are now at risk of severe data breaches and system compromises.

Who's Affected

The attack impacts a vast number of developers and organizations that rely on Axios for making HTTP requests in JavaScript applications. Given its popularity in the developer community, the compromised versions could have affected countless projects and applications. Any user who installed Axios versions 1.14.1 or 0.30.4 is at risk, and immediate action is necessary to mitigate potential damages.

As the malicious versions are no longer available for download, the focus shifts to those who have already integrated them into their systems. This incident serves as a stark reminder of the vulnerabilities inherent in supply chain dependencies, especially in the open-source ecosystem where trust is paramount.

What Data Was Exposed

While specific data exposure details remain unclear, the nature of the RAT suggests that attackers could gain access to sensitive information stored on compromised devices. The RAT is capable of collecting system and hardware information, executing arbitrary commands, and establishing persistent connections with the C2 server. This means attackers could potentially steal credentials, access sensitive files, and manipulate systems remotely.

The implications are severe, particularly for organizations handling sensitive data or financial transactions. The risk of data theft and unauthorized access to critical systems underscores the importance of immediate remediation steps for affected users.

What You Should Do

If you have installed Axios versions 1.14.1 or 0.30.4, it is crucial to take immediate action:

  • Rotate your secrets and credentials to prevent unauthorized access.
  • Downgrade to a safe version (1.14.0 or 0.30.3) to eliminate the risk of the malicious payload.
  • Disable auto-updates for Axios npm packages to prevent reinstallation of the malicious versions.

Additionally, organizations should implement monitoring and detection capabilities to identify any signs of compromise. Regularly reviewing dependencies and maintaining an updated inventory of software components can help mitigate risks associated with future supply chain attacks. Stay informed about ongoing developments and follow best practices for securing your software supply chain.

🔒 Pro insight: This incident highlights the critical need for robust supply chain security measures in open-source ecosystems to prevent similar attacks in the future.

Original article from

MSMicrosoft Security Blog· Microsoft Threat Intelligence and Microsoft Defender Security Research Team
Read Full Article

Related Pings

HIGHThreat Intel

Supply Chain Attack - Axios npm Package Compromised

A major supply chain attack targeted the Axios npm package, affecting millions of applications. Malicious versions were published, risking user data and system integrity. Organizations must act quickly to mitigate the impact and secure their environments.

Arctic Wolf Blog·
HIGHThreat Intel

STARDUST CHOLLIMA - Compromises Axios npm Package

A serious security breach has compromised the Axios npm package, affecting countless developers. This incident highlights the vulnerabilities in software supply chains, especially for cryptocurrency users. Action is needed to safeguard against these sophisticated attacks.

CrowdStrike Blog·
HIGHThreat Intel

Axios Supply Chain Attack - How It Was Detected

A major supply chain attack on Axios was detected using a proof of concept tool. This incident highlights vulnerabilities in package management systems and the need for better security measures. Swift action was taken to mitigate the damage and protect users.

Elastic Security Labs·
HIGHThreat Intel

Iran Cyber Campaign - North Korea Targets Axios NPM Package

Iran's cyber campaign intensifies, targeting U.S. interests. North Korea compromises the Axios NPM package, raising serious supply chain concerns. Organizations must act swiftly to bolster defenses.

CyberWire Daily·
HIGHThreat Intel

Mercor Confirms Security Incident from LiteLLM Supply Chain Attack, Data Stolen

Mercor confirms it was impacted by the LiteLLM supply chain attack, with significant data theft reported by the extortion group Lapsus$.

The Record·
HIGHThreat Intel

Axios Supply Chain Attack - Widespread Impact Revealed

A recent supply chain attack on Axios has led to the deployment of malware across multiple sectors. This incident affects businesses globally, emphasizing the critical need for immediate security measures. Stay informed and protect your systems from potential exploitation.

Palo Alto Unit 42·