Threat IntelHIGH

Supply Chain Attack - Axios npm Package Compromised

Featured image for Supply Chain Attack - Axios npm Package Compromised
AWArctic Wolf Blog
Axiosnpmsupply chain attackmalicious packageremote access trojan
🎯

Basically, hackers tricked a popular software tool into spreading malware.

Quick Summary

A major supply chain attack targeted the Axios npm package, affecting millions of applications. Malicious versions were published, risking user data and system integrity. Organizations must act quickly to mitigate the impact and secure their environments.

What Happened

On March 31, 2026, the Axios npm package, a popular JavaScript library for making HTTP/S requests, was compromised in a supply chain attack. Between approximately 00:21 and 03:30 UTC, malicious versions (axios@1.14.1 and axios@0.30.4) were published using a compromised maintainer account. These versions included a hidden dependency, plain-crypto-js@4.2.1, which contained a postinstall script functioning as a cross-platform remote access trojan (RAT).

Once installed, the script executed automatically, connecting to a command-and-control server to deploy malicious payloads on various operating systems, including macOS, Windows, and Linux. The threat actor had pre-staged the attack by creating a throwaway npm account and publishing a decoy package, plain-crypto-js@4.2.0, to lend credibility to their malicious versions. The malicious Axios versions were available for about three hours before being removed by npm.

Who's Affected

The impact of this attack is significant due to the widespread use of Axios. It's included as a dependency in millions of applications, meaning many organizations could unknowingly pull these malicious versions into their environments. This risk extends beyond those who directly installed Axios; any application relying on the compromised versions could also be affected, leading to a broader downstream risk across the JavaScript ecosystem.

Organizations that utilize npm packages in their CI/CD pipelines are especially vulnerable, as they may have automatically integrated the malicious Axios versions during the attack window. This incident highlights the critical need for vigilance in managing software dependencies.

Tactics & Techniques

The attack employed several tactics to ensure its success:

  • Compromised Account: The attacker used a legitimate maintainer's account to publish malicious packages, making detection more challenging.
  • Decoy Package: By publishing a benign-looking package first, the attacker established trust before releasing the malicious versions.
  • Silent Execution: The postinstall script executed without user consent, allowing the RAT to operate undetected.

These tactics underscore the evolving nature of supply chain attacks, where attackers exploit trust relationships within software ecosystems.

Defensive Measures

To protect against such supply chain attacks, organizations should take immediate actions:

  • Revert to Safe Versions: Users should revert Axios to known safe versions: axios@1.14.0 for 1.x users or axios@0.30.3 for 0.x users. This is crucial if any impacted versions were used during the attack.
  • Clear Caches and Lockfiles: Organizations should clear any caches, lockfiles, and CI/CD artifacts that may have pulled the malicious versions. Reinstalling dependencies in a clean environment is essential for preventing lingering compromises.
  • Rotate Exposed Credentials: Any credentials that may have been exposed during the compromise should be considered at risk. Rotate repository secrets, API keys, and any other credentials used in the affected environments.

Additionally, implementing proactive npm security measures can help mitigate future risks. Enforcing a quarantine period for new package versions and limiting script execution in CI/CD environments can significantly reduce the likelihood of falling victim to similar attacks.

🔒 Pro insight: This incident exemplifies the vulnerabilities in software supply chains, emphasizing the need for rigorous dependency management practices.

Original article from

AWArctic Wolf Blog· Andres Ramos
Read Full Article

Related Pings

HIGHThreat Intel

STARDUST CHOLLIMA - Compromises Axios npm Package

A serious security breach has compromised the Axios npm package, affecting countless developers. This incident highlights the vulnerabilities in software supply chains, especially for cryptocurrency users. Action is needed to safeguard against these sophisticated attacks.

CrowdStrike Blog·
HIGHThreat Intel

Axios Supply Chain Attack - How It Was Detected

A major supply chain attack on Axios was detected using a proof of concept tool. This incident highlights vulnerabilities in package management systems and the need for better security measures. Swift action was taken to mitigate the damage and protect users.

Elastic Security Labs·
HIGHThreat Intel

Axios npm Supply Chain Attack - Mitigation Steps Explained

Axios experienced a serious supply chain attack linked to North Korea's Sapphire Sleet. Countless users who downloaded the malicious npm packages are at risk. Immediate actions are necessary to secure affected systems and prevent further exploitation.

Microsoft Security Blog·
HIGHThreat Intel

Iran Cyber Campaign - North Korea Targets Axios NPM Package

Iran's cyber campaign intensifies, targeting U.S. interests. North Korea compromises the Axios NPM package, raising serious supply chain concerns. Organizations must act swiftly to bolster defenses.

CyberWire Daily·
HIGHThreat Intel

Mercor Confirms Security Incident from LiteLLM Supply Chain Attack, Data Stolen

Mercor confirms it was impacted by the LiteLLM supply chain attack, with significant data theft reported by the extortion group Lapsus$.

The Record·
HIGHThreat Intel

Axios Supply Chain Attack - Widespread Impact Revealed

A recent supply chain attack on Axios has led to the deployment of malware across multiple sectors. This incident affects businesses globally, emphasizing the critical need for immediate security measures. Stay informed and protect your systems from potential exploitation.

Palo Alto Unit 42·