Axios Supply Chain Compromise - Cross-Platform RAT Detected

Basically, hackers used a trusted software package to secretly install malware on many computers.
A major supply chain attack compromised the axios npm package, delivering a cross-platform RAT. Millions of users are at risk. Developers must update to secure versions immediately.
What Happened
On March 30, 2026, a significant supply chain compromise was detected involving the axios npm package, a widely used JavaScript library with approximately 100 million weekly downloads. The attacker gained unauthorized access to the maintainer account of jasonsaayman, publishing two malicious versions of the axios package. These versions, tagged as 1.14.1 and 0.30.4, contained a Remote Access Trojan (RAT) that could infect macOS, Windows, and Linux systems through a malicious postinstall hook.
The compromised versions were designed to automatically install a new dependency, plain-crypto-js, which executed a platform-specific RAT upon installation. This attack was particularly concerning due to the sheer number of users who could potentially download the backdoored package by default.
Who's Affected
The attack primarily affects developers and projects that utilize the axios package for HTTP requests. Given axios's popularity, the blast radius is extensive, impacting countless applications and services relying on this library. Users who installed either of the compromised versions unknowingly exposed their systems to the RAT, which could allow attackers to gain remote control.
The compromised maintainer account was pivotal in this attack, as it enabled the attacker to publish malicious updates that appeared legitimate to unsuspecting users. The incident serves as a stark reminder of the vulnerabilities present in widely-used open-source software.
What Data Was Exposed
The RAT deployed through the compromised axios package is capable of extensive data collection and system manipulation. It collects sensitive information such as:
- Hostname and username
- OS version and hardware model
- Process lists and system profiles
Each platform variant of the RAT (Windows, macOS, and Linux) shares an identical command and control (C2) protocol, allowing attackers to issue commands and receive data from infected systems. This uniformity suggests a coordinated effort by the attackers to maximize their reach and effectiveness.
What You Should Do
If you are a developer using the axios package, it is crucial to check your dependencies and ensure you are using safe versions. The last legitimate versions are axios@1.14.0 and axios@0.30.3. You should:
- Update your package dependencies immediately.
- Monitor your systems for any suspicious activity.
- Consider implementing additional security measures, such as using package integrity checks and automated dependency monitoring tools.
This incident underscores the importance of vigilance in software supply chains and the need for robust security practices when managing dependencies.