Malware & RansomwareHIGH

Hackers Compromise Axios npm Package to Deliver Malware

Featured image for Hackers Compromise Axios npm Package to Deliver Malware
BCBleepingComputer
AxiosnpmRATRemote Access TrojanSupply Chain Attack
🎯

Basically, hackers broke into a popular software package to spread harmful programs to many computers.

Quick Summary

Hackers have compromised the Axios npm package, delivering malware to countless systems. This attack may affect millions of users. Immediate action is needed to secure environments.

What Happened

Hackers have successfully compromised the npm account of the Axios package, a widely used JavaScript HTTP client with over 100 million weekly downloads. This breach allowed them to publish two malicious versions of the package, axios@1.14.1 and axios@0.30.4, within a short time frame. The malicious versions were published without proper verification, raising alarms about the security of package management systems.

The threat actor gained access to the Axios package by hijacking the account of Jason Saayman, the main maintainer. During the nearly three-hour exposure window, it remains unclear how many downstream projects may have been affected. Given the popularity of Axios, the number could be substantial.

How It Works

Once the attackers gained access, they injected a malicious dependency called plain-crypto-js@^4.2.1 into the package.json file. This dependency executes a post-install script that launches an obfuscated dropper (setup.js). The dropper contacts a command-and-control (C2) server to retrieve a payload tailored to the detected operating system.

For Windows, the malware uses a combination of VBScript and PowerShell to run hidden scripts. On macOS, it employs AppleScript to execute malicious binaries, while on Linux, it fetches a Python-based payload. In all cases, the malware allows attackers to maintain control over infected systems, executing commands and retrieving sensitive information.

Who's Being Targeted

The Axios npm package is widely utilized in JavaScript applications, making its users prime targets for this attack. The malicious payloads were designed to infect Linux, Windows, and macOS systems, showcasing the attackers' intention to reach a broad audience. With 400 million monthly downloads, the potential impact is significant, affecting countless developers and organizations that rely on Axios for their applications.

The attackers' strategy appears to be well-planned, with the malicious dependency staged 18 hours before the actual attack. This indicates a level of sophistication that raises concerns about the security of software supply chains.

What You Should Do

If you're using Axios, it is crucial to take immediate action. Users are advised to revert to the last known clean versions, axios@1.14.0 and axios@0.30.3. If you suspect your environment may have been compromised, rotate all credentials and rebuild from a known good state.

Moreover, this incident highlights the importance of vigilance in software supply chain security. Regularly auditing dependencies and monitoring for unusual activity can help mitigate the risks associated with such attacks. Stay informed about security updates and best practices to protect your systems from similar threats.

🔒 Pro insight: This incident underscores the critical need for enhanced security measures in package management systems to prevent future supply chain attacks.

Original article from

BCBleepingComputer· Bill Toulas
Read Full Article

Related Pings

HIGHMalware & Ransomware

Axios Supply Chain Attack - Malicious Packages Discovered

A supply chain attack on Axios has led to malicious npm packages being distributed. Developers may have unknowingly installed a Remote Access Trojan. It's crucial to assess and secure your development environments to prevent exploitation.

Malwarebytes Labs·
HIGHMalware & Ransomware

Venom Stealer - Continuous Credential Harvesting Threatens Users

Venom Stealer is a new malware that continuously steals credentials and cryptocurrency. Its advanced tactics pose a serious risk to users. Understanding its methods is vital for safeguarding sensitive data.

SecurityWeek·
HIGHMalware & Ransomware

WhatsApp Malware - Campaign Delivers VBS Payloads and MSI Backdoors

A new malware campaign exploits WhatsApp to deliver harmful VBS scripts. This attack targets users and organizations, compromising systems and maintaining access. Stay vigilant and protect your devices.

Microsoft Security Blog·
HIGHMalware & Ransomware

Ransomware - New Service Promises to Monetize Stolen Data

A new service called Leak Bazaar aims to monetize stolen data from ransomware attacks. This could lead to increased threats and exploitation of personal data. Experts are watching closely as this model unfolds.

The Record·
HIGHMalware & Ransomware

EtherHiding - Covert Malware Threat in Developer Toolchain

A new malware campaign, EtherHiding, targets developers by hiding malicious code in their tools. This stealthy threat risks sensitive data and system integrity. Stay alert and secure your coding environment against these attacks.

Canadian Cyber Centre News·
HIGHMalware & Ransomware

Malware - Backdoored LiteLLM Package Exposed by Trivy

A backdoored LiteLLM Python package was published by TeamPCP after compromising PyPI credentials via Trivy. Millions of users could be affected. It's crucial to check your installations and stay updated.

Snyk Blog·