Threat IntelHIGH

Axios Supply Chain Attack - Widespread Impact Revealed

Featured image for Axios Supply Chain Attack - Widespread Impact Revealed
U4Palo Alto Unit 42
Axiossupply chain attackremote access TrojannpmUnit 42
🎯

Basically, hackers compromised Axios software, allowing them to install dangerous programs on many computers.

Quick Summary

A recent supply chain attack on Axios has led to the deployment of malware across multiple sectors. This incident affects businesses globally, emphasizing the critical need for immediate security measures. Stay informed and protect your systems from potential exploitation.

What Happened

Recently, a supply chain attack targeted the popular Axios JavaScript library, impacting numerous sectors worldwide. This attack occurred after an Axios maintainer's npm account was hijacked, leading to the release of malicious updates—specifically versions v1.14.1 and v0.30.4. These updates included a hidden dependency named plain-crypto-js, a remote access Trojan (RAT) capable of infecting Windows, macOS, and Linux systems. The malware's purpose was to perform reconnaissance and establish persistence while also having a self-destruct feature to evade detection.

The Axios library is widely used for making API requests in both browsers and Node.js environments. Its automatic JSON data transformation and request interception make it a standard tool for developers. However, this attack has raised serious concerns about the security of dependencies in software development, especially when utilizing third-party libraries.

Who's Affected

The fallout from this attack is extensive, affecting various sectors across the U.S., Europe, Middle East, South Asia, and Australia. Key industries impacted include:

  • Business services
  • Customer service
  • Financial services
  • High tech
  • Higher education
  • Insurance
  • Media and entertainment
  • Medical equipment
  • Professional and legal services
  • Retail services

Given Axios's popularity, the potential for widespread exploitation is significant. Organizations relying on this library for their applications must act swiftly to assess their exposure and mitigate risks.

Tactics & Techniques

The attackers utilized a sophisticated method to deploy the RAT. When a developer ran npm install axios, the npm package manager automatically resolved dependencies, including the malicious plain-crypto-js. This process triggered a post-install lifecycle hook, executing an obfuscated Node.js dropper script named setup.js. The dropper then queried the operating system and contacted a command-and-control (C2) server to download platform-specific payloads.

Each operating system received a tailored payload:

  • macOS: An AppleScript that downloads a C++ compiled binary.
  • Windows: A disguised PowerShell binary that establishes persistence through the registry.
  • Linux: A Python RAT script that runs in the background.

Despite being written in different languages, all payloads shared a common architecture, communicating with the C2 server using a standardized protocol.

Defensive Measures

To protect against this threat, organizations should prioritize the following actions:

  • Update Dependencies: Ensure that all instances of Axios are updated to secure versions.
  • Monitor for Anomalies: Use threat detection tools to monitor for unusual activity related to the Axios package.
  • Implement Security Best Practices: Adopt strict security measures when using third-party libraries, including regular audits and dependency checks.

Palo Alto Networks offers several products that can help mitigate these threats, including Advanced URL Filtering, Cortex XDR, and Managed Threat Hunting services. Engaging with incident response teams can further enhance security posture and reduce risk exposure.

🔒 Pro insight: This attack exemplifies the risks associated with supply chain vulnerabilities—expect increased scrutiny on npm packages and dependency management practices.

Original article from

U4Palo Alto Unit 42· Unit 42
Read Full Article

Related Pings

HIGHThreat Intel

Supply Chain Attack - Axios npm Package Compromised

A major supply chain attack targeted the Axios npm package, affecting millions of applications. Malicious versions were published, risking user data and system integrity. Organizations must act quickly to mitigate the impact and secure their environments.

Arctic Wolf Blog·
HIGHThreat Intel

STARDUST CHOLLIMA - Compromises Axios npm Package

A serious security breach has compromised the Axios npm package, affecting countless developers. This incident highlights the vulnerabilities in software supply chains, especially for cryptocurrency users. Action is needed to safeguard against these sophisticated attacks.

CrowdStrike Blog·
HIGHThreat Intel

Axios Supply Chain Attack - How It Was Detected

A major supply chain attack on Axios was detected using a proof of concept tool. This incident highlights vulnerabilities in package management systems and the need for better security measures. Swift action was taken to mitigate the damage and protect users.

Elastic Security Labs·
HIGHThreat Intel

Axios npm Supply Chain Attack - Mitigation Steps Explained

Axios experienced a serious supply chain attack linked to North Korea's Sapphire Sleet. Countless users who downloaded the malicious npm packages are at risk. Immediate actions are necessary to secure affected systems and prevent further exploitation.

Microsoft Security Blog·
HIGHThreat Intel

Iran Cyber Campaign - North Korea Targets Axios NPM Package

Iran's cyber campaign intensifies, targeting U.S. interests. North Korea compromises the Axios NPM package, raising serious supply chain concerns. Organizations must act swiftly to bolster defenses.

CyberWire Daily·
HIGHThreat Intel

Mercor Confirms Security Incident from LiteLLM Supply Chain Attack, Data Stolen

Mercor confirms it was impacted by the LiteLLM supply chain attack, with significant data theft reported by the extortion group Lapsus$.

The Record·