Categories: Cyber Security News

Axios NPM Packages Compromised in Active Supply Chain Attack

A severe and sophisticated supply chain attack has struck the widely used Axios HTTP client on the npm registry, exposing millions of developers worldwide to a cross-platform remote access trojan (RAT) capable of executing arbitrary commands and harvesting sensitive system data.

Maintainer Account Hijacked

The attack originated from a compromised maintainer account. According to StepSecurity, threat actors seized control of the jasonsaayman npm account Axios’s lead maintainer changed the registered email to an anonymous ProtonMail address, and manually published two malicious versions: axios@1.14.1 and axios@0.30.4.

Neither release has a corresponding GitHub commit or tag, confirming the attackers bypassed the project’s normal GitHub Actions CI/CD pipeline entirely.

The situation worsened when maintainers discovered the attacker’s account permissions exceeded their own, preventing immediate access revocation.

The Phantom Dependency

Both poisoned versions injected a fake dependency, plain-crypto-js@4.2.1a package that did not exist before the attack.

Attackers pre-staged this malicious dependency approximately 18 hours before the Axios compromise, using a caret range, so any new npm install would automatically pull it.

The package is never actually used in the Axios source code; its sole purpose is to trigger a postinstall lifecycle hook that drops the RAT.

The postinstall hook executes a dropper script named setup.js, protected by a two-layer obfuscation scheme combining Base64 string reversal and a hardcoded XOR cipher to evade static analysis and signature-based detection.

Once decoded, the script identifies the host operating system and contacts the attacker’s command-and-control (C2) server at sfrclak[.]com (IP: 142.11.206.73) to retrieve a platform-specific second-stage payload.x+1

Cross-Platform Payloads

The malware delivers tailored RATs for each operating system:

  • macOS — A C++ Mach-O RAT disguised as a legitimate Apple background daemon, saved to /Library/Caches/com.apple.act.mond, capable of system fingerprinting and executing signed malicious binaries
  • Windows — PowerShell disguised as Windows Terminal executes a hidden VBScript to download the final payload while bypassing execution policies
  • Linux — A detached Python script (/tmp/ld.py) runs silently in the background

All variants communicate with the C2 server using HTTP POST requests formatted to mimic normal npm registry traffic.

Evidence Destruction

After successful execution, the malware deletes the setup.js dropper and the malicious package.json, then renames a pre-staged clean markdown file to replace the removed configuration, making the infected directory appear to be a harmless cryptography library with no remaining malicious artifacts.

Socket detected the attack within six minutes of publication, but the poisoned versions had already been distributed.

Type Value
Malicious Packages axios@1.14.1, axios@0.30.4, plain-crypto-js@4.2.1
C2 Server sfrclak[.]com
C2 IP 142.11.206.73
macOS Artifact /Library/Caches/com.apple.act.mond
Windows Artifact %ProgramData%wt.exe
Linux Artifact /tmp/ld.py

Remediation Steps

Developers are strongly advised to take the following actions immediately:

  • Downgrade to axios@1.14.0 (1.x users) or axios@0.30.3 (0.x users)
  • Rotate all credentials, API keys, and secrets on any exposed machine
  • Audit network logs for outbound connections to sfrclak[.]com or 142.11.206.73
  • Use --ignore-scripts in CI/CD environments to block malicious postinstall hooks
  • Pin exact dependency versions and scan lockfiles for compromised packages

This marks the third major npm supply chain attack in six months, underscoring the growing risk of publisher account compromise as a primary attack vector against the open-source ecosystem.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google

The post Axios NPM Packages Compromised in Active Supply Chain Attack appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Everything Coming to Disney+ in April 2026

April showers will eventually bring May flowers, but for now, at least we're getting some…

2 hours ago

Save 46% Off the Anker SOLIX C800 X 768Wh 1,200W LiFePO4 Power Station for the Amazon Spring Sale

Anker is one of the most recognized and trusted battery backup brands on Amazon. It's…

2 hours ago

An Olympic Bronze Medalist Kicked My Ass in Mario Tennis Fever and I Lived to Tell the Tale

Let me set the scene. On one side we have Taylor Fritz. Olympic bronze medalist.…

2 hours ago

IGN Women’s Favorite Movies and Shows Made by Women

With Women's History Month coming to a close, we wanted to celebrate women we are…

2 hours ago

New ANY.RUN macOS Sandbox Helps SOC Teams Analyze Apple Threats Faster

ANY.RUN has expanded its interactive sandbox platform to include macOS virtual machines, now available in…

2 hours ago

PNG Vulnerabilities Allow Attackers to Crash Systems and Leak Sensitive Data

Security researchers have disclosed two high-severity vulnerabilities in libpng, the widely deployed reference library used…

2 hours ago

This website uses cookies.