Malware & RansomwareHIGH

Supply Chain Attack - axios npm Package Compromised

Featured image for Supply Chain Attack - axios npm Package Compromised
#axios#npm#Remote Access Trojan#North Korea#Huntress

Original Reporting

HNHuntress Blog

AI Intelligence Briefing

CyberPings AIΒ·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk β€” action recommended within 24-48 hours

🦠
🦠 MALWARE PROFILE
Malware Nameplain-crypto-js
Malware TypeRemote Access Trojan
Threat ActorNorth Korean state-sponsored group
Target PlatformmacOS, Windows, Linux
Delivery MethodMalicious npm package
Persistence MechanismScheduled tasks and registry keys
C2 Infrastructurecalltan.com
CapabilitiesRemote control, credential theft, data exfiltration
IOCs AvailableC2 domains, malicious package names
Detection RateLow - initially undetected
MITRE ATT&CKT1071.001 (Application Layer Protocol: Web Protocols)
🎯

Basically, hackers took over a popular software package to install malware on many computers.

Quick Summary

A supply chain attack has compromised the axios npm package, affecting over 100 devices. This incident raises major security concerns as attackers delivered a Remote Access Trojan. Organizations must act quickly to audit and secure their systems.

What Happened

On March 31, 2026, a significant supply chain attack targeted the widely used axios npm package. An attacker compromised the npm credentials of the lead maintainer, allowing them to publish two malicious versions: axios@1.14.1 and axios@0.30.4. These versions included a hidden dependency, plain-crypto-js@4.2.1, which executed a Remote Access Trojan (RAT) upon installation. This attack impacted countless systems, as axios is integral to many JavaScript applications.

Who's Affected

The attack potentially affected any environment that executed npm install for the compromised versions during a critical three-hour window. Huntress observed at least 135 endpoints across various operating systems contacting the attacker's command-and-control infrastructure. Given axios's popularity, the number of impacted users could be much higher.

How It Works

The malicious package introduced a post-install script that triggered the RAT installation without user interaction. The RAT targeted macOS, Windows, and Linux systems, allowing attackers to gain control over compromised devices. The attack was executed in a highly coordinated manner, with the malicious versions published during off-peak hours to minimize detection.

Signs of Infection

Indicators of compromise include unusual network activity, especially connections to the domains associated with the attack. Systems that installed the affected axios versions may exhibit signs of unauthorized access or data exfiltration. Users should be vigilant for unexpected behavior on their machines.

How to Protect Yourself

Organizations must audit their dependencies and check for installations of axios@1.14.1 or axios@0.30.4. If found, treat those systems as compromised. Key remediation steps include:

  • Rotate all credentials used on affected systems.
  • Rebuild compromised systems to eliminate any remnants of the RAT.
  • Monitor network traffic for any unusual connections.
  • Educate teams about secure coding practices and dependency management.

Conclusion

This incident highlights the vulnerabilities inherent in supply chain management for software development. As attackers increasingly target popular libraries, developers must prioritize security and remain vigilant against such threats. The axios npm attack serves as a critical reminder of the need for robust security measures in the open-source ecosystem.

πŸ” How to Check If You're Affected

  1. 1.Audit your npm dependencies for axios@1.14.1 or axios@0.30.4.
  2. 2.Monitor network traffic for connections to known malicious domains.
  3. 3.Check for unusual processes or scripts running on affected systems.

🏒 Impacted Sectors

TechnologyAll Sectors

Pro Insight

πŸ”’ Pro insight: This incident underscores the risks of supply chain vulnerabilities in open-source dependencies, necessitating stricter security protocols for package management.

Sources

Original Report

HNHuntress Blog
Read Original

Related Pings

HIGHMalware & Ransomware

NightSpire Ransomware - Analyzing Evolving IOCs and TTPs

A recent NightSpire ransomware incident shows how evolving tactics complicate detection and recovery. Organizations must adapt to these changes to protect their data.

Huntress BlogΒ·
HIGHMalware & Ransomware

Malware Campaign - Fake Software Installers Deliver RATs

A malware campaign tricks users into downloading fake software installers that deliver RATs and Monero miners. This long-running operation has earned the attacker significant revenue. Stay vigilant to avoid falling victim to such scams.

Cyber Security NewsΒ·
HIGHMalware & Ransomware

Storm-1175 - High-Tempo Medusa Ransomware Operations Unveiled

Storm-1175 is rapidly executing ransomware attacks, moving from initial access to deployment within 24 hours. Targeting critical sectors, they exploit vulnerabilities before patches are applied.

Microsoft Security BlogΒ·
HIGHMalware & Ransomware

Trojanized PyPI AI Proxy Steals User Data Silently

A malicious Python package named hermes-px has been found on PyPI, masquerading as a privacy-focused AI tool. Developers are unknowingly at risk of data breaches, as the package exfiltrates sensitive information. Immediate action is required to mitigate potential damage.

Cyber Security NewsΒ·
HIGHMalware & Ransomware

Malicious Strapi NPM Packages Target Guardarian Users

36 malicious NPM packages targeting Strapi users have been discovered, capable of executing shells and harvesting credentials. The attack exploits Redis and PostgreSQL vulnerabilities, posing significant risks to Guardarian's ecosystem.

SecurityWeekΒ·
HIGHMalware & Ransomware

ILSpy Domain Compromised - Malware Delivered to Developers

Hackers compromised the ILSpy WordPress domain, redirecting users to a malicious site. Developers are at risk of malware disguised as a browser extension. Stay vigilant and verify downloads!

Cyber Security NewsΒ·