Cloud SecurityHIGH

SentinelOne AI EDR Stops Axios Supply Chain Attack Autonomously

Featured image for SentinelOne AI EDR Stops Axios Supply Chain Attack Autonomously
S1SentinelOne Labs
SentinelOneAxiosUNC1069RATnpm
🎯

Basically, a North Korean hacker tried to infect software, but SentinelOne's AI stopped it automatically.

Quick Summary

A North Korean cyber attack targeted Axios, but SentinelOne's AI EDR thwarted it before execution. This incident highlights the importance of autonomous security measures in protecting software supply chains.

What Happened

On March 31, 2026, a North Korean state actor hijacked the npm credentials of the primary maintainer of Axios, a widely used HTTP client in the JavaScript ecosystem. The attacker published two backdoored releases that deployed a cross-platform remote access trojan (RAT) to systems running Windows, macOS, and Linux. During a mere three-hour window, approximately 600,000 downloads occurred without user interaction, showcasing the attack's potential scale.

The malicious packages were tagged as [email protected] and [email protected], each introducing a new dependency that silently deployed the RAT. The attack was executed with remarkable sophistication, utilizing techniques to evade detection and ensuring that the malware left minimal forensic evidence.

Who's Affected

The attack primarily affected users and organizations utilizing Axios, which boasts around 100 million weekly downloads. Given Axios's prevalence in cloud and code environments, the potential impact on developers and enterprises was significant. Anyone who installed the compromised versions during the exposure window is at risk.

What Data Was Exposed

While the primary goal of the attack was to deploy the RAT, the compromised systems could potentially expose sensitive credentials, including npm tokens, SSH keys, and CI/CD secrets. The RAT was designed to harvest these types of credentials, making the attack particularly dangerous for organizations relying on Axios for their software delivery.

SentinelOne's Response

SentinelOne acted swiftly to protect its customers. The Lunar behavioral engine detected the attack's execution techniques, regardless of the specific payload hash. Additionally, a global hash blocklist was implemented to prevent known malicious npm package tarballs and RAT binaries from being executed across all platforms.

Proactive Threat Hunting

The Wayfinder Threat Hunting team conducted proactive hunts using Axios-specific indicators of compromise (IOCs), ensuring that any potential threats were identified and addressed. This included monitoring DNS queries and file artifacts related to the attack.

Continuous Research

SentinelLabs has been tracking the BlueNoroff threat cluster, linked to the North Korean attack. This ongoing research allows SentinelOne to stay ahead of emerging threats and improve their detection capabilities continuously.

What You Should Do Now

Organizations should take immediate action to protect their environments:

  1. Audit and Contain: Search for the compromised Axios versions and treat any affected systems as fully compromised.
  2. Rotate Credentials: Change all credentials that the endpoint could access, including npm tokens and API keys.
  3. Pin Dependencies: Use npm ci in CI/CD pipelines to enforce strict lockfile discipline.
  4. Eliminate Legacy Tokens: Remove long-lived tokens and migrate to OIDC Trusted Publishing.
  5. Harden Detection Policies: Ensure behavioral detection engines are set to protect on execution.
  6. Extend Coverage: Include developer workstations and CI runners in endpoint coverage.
  7. Hunt Proactively: Use Deep Visibility to search for suspicious activity related to the attack.

By implementing these measures, organizations can enhance their defenses against future supply chain attacks.

🔒 Pro insight: This incident underscores the critical need for real-time detection and response capabilities in software supply chain security.

Original article from

S1SentinelOne Labs· SentinelOne
Read Full Article

Related Pings

HIGHCloud Security

Rethinking Cache Design for the AI Era - Cloudflare Insights

Cloudflare is rethinking cache design to handle the surge in AI traffic. With 32% of requests from AI bots, traditional methods struggle. Optimizing caching is crucial for performance.

Cloudflare Blog·
HIGHCloud Security

Trusted Open Source Report - Insights on Vulnerabilities

The latest Trusted Open Source report reveals significant insights into container image usage and vulnerabilities. It highlights how AI is transforming software development and security. Understanding these trends is crucial for teams to mitigate risks effectively.

The Hacker News·
MEDIUMCloud Security

Microsoft Outlook - Investigates Email Delivery Problems

Microsoft is investigating email delivery issues affecting Classic Outlook users. Some users linked to Exchange accounts are unable to send emails. Workarounds are available while a fix is in progress.

BleepingComputer·
MEDIUMCloud Security

Microsoft Exchange Online - High Volume Email Feature Launched

Microsoft has launched High Volume Email for Exchange Online, addressing the need for sending large volumes of automated messages. This feature enhances internal communications while maintaining security. Organizations can now streamline their messaging without hitting previous limits.

Help Net Security·
HIGHCloud Security

Windows Secure Boot - Falcon IT Enhances Certificate Management

CrowdStrike's Falcon for IT is now equipped to manage the transition to the new Windows Secure Boot certificate. This change impacts all Secure Boot-enabled devices, ensuring compliance and security updates. IT teams must act to avoid operational risks and maintain security integrity.

CrowdStrike Blog·
HIGHCloud Security

AWS Environments Targeted by TeamPCP in Major Attack

TeamPCP has targeted AWS environments, exploiting stolen credentials from supply chain attacks. This raises serious concerns for cloud security and data protection. Organizations must act quickly to safeguard their resources.

SC Media·