Axios NPM Distribution Compromised in Supply Chain Attack
An unknown threat actor compromised the npm account of an axios maintainer, publishing two malicious versions of the package. These versions introduced a dependency on plain-crypto-js, a newly created malicious package. Despite quick removal, axios's widespread usage led to rapid exposure. The malicious package includes a dropper that downloads and executes platform-specific second-stage payloads, functioning as remote access trojans. These payloads can execute remote shells, inject binaries, browse directories, list processes, and perform system reconnaissance. Organizations are advised to audit their environments, remove malicious artifacts, rotate exposed credentials, investigate potential compromise paths, and monitor for suspicious activity.
AI Analysis
Technical Summary
This threat involves a supply chain compromise of the popular Axios npm package, widely used in JavaScript and Node.js development. An unknown threat actor gained access to the npm account of an Axios maintainer and published two malicious versions of the package. These versions introduced a dependency on a newly created malicious package named plain-crypto-js. The malicious package functions as a dropper that downloads and executes platform-specific second-stage payloads, which are remote access trojans (RATs). These RATs provide attackers with capabilities such as executing remote shells, injecting binaries into processes, browsing file directories, enumerating running processes, and performing system reconnaissance. The attack chain involves credential compromise of the maintainer’s npm account, enabling the attacker to publish malicious code under a trusted package name, thereby increasing the likelihood of widespread infection due to Axios's popularity. Although the malicious versions were quickly removed from the npm registry, the rapid adoption and integration of Axios in many projects led to significant exposure. The threat actor’s use of a newly created malicious dependency complicates detection, as it may not be flagged by traditional supply chain security tools. The attack techniques correspond to several MITRE ATT&CK tactics and techniques, including persistence, defense evasion, execution, and command and control. No CVE identifier or known exploits in the wild have been reported at the time of this analysis. The attack highlights the risks of compromised developer credentials and the importance of securing software supply chains.
Potential Impact
The impact of this supply chain attack is significant due to Axios's widespread use in web and server-side applications globally. Organizations using affected Axios versions risk remote compromise through the installed malicious dependency, potentially leading to unauthorized remote shell access, data exfiltration, lateral movement, and persistent footholds within networks. The attacker’s ability to inject binaries and perform system reconnaissance increases the risk of further exploitation and tailored attacks. This can result in data breaches, intellectual property theft, operational disruption, and reputational damage. The attack also undermines trust in open-source software supply chains, potentially affecting development workflows and increasing operational costs due to required audits and remediation. Although no active exploitation campaigns are currently known, the potential for rapid exploitation remains high given the ease of dependency inclusion in modern development. Organizations that fail to detect and remediate this compromise may face prolonged exposure and elevated risk of secondary attacks.
Mitigation Recommendations
Organizations should immediately audit their software dependencies to identify any use of the malicious Axios versions or the plain-crypto-js package. Remove all instances of these malicious packages from development, build, and production environments. Rotate all credentials that may have been exposed or used in compromised build or deployment pipelines, including npm accounts and related developer credentials. Implement strict access controls and multi-factor authentication (MFA) for all package repository accounts to prevent future credential compromises. Monitor network traffic and endpoint logs for indicators of compromise, such as connections to the domain sfrclak.com or execution of suspicious binaries matching the provided hashes. Employ software composition analysis (SCA) tools to detect unauthorized or malicious dependencies proactively. Conduct thorough forensic investigations to identify potential lateral movement or persistence established by the attacker. Educate development teams on supply chain risks and enforce policies to verify package integrity and provenance before inclusion. Consider implementing automated alerts for unexpected dependency changes and use cryptographic signing of packages where supported. Finally, maintain up-to-date incident response plans tailored to supply chain compromise scenarios.
Affected Countries
United States, India, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, Brazil
Indicators of Compromise
- hash: 58401c195fe0a6204b42f5f90995ece5fab74ce7c69c67a24c61a057325af668
- hash: 59336a964f110c25c112bcc5adca7090296b54ab33fa95c0744b94f8a0d80c0f
- hash: 5bb67e88846096f1f8d42a0f0350c9c46260591567612ff9af46f98d1b7571cd
- hash: 617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101
- hash: 92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a
- hash: fcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf
- domain: sfrclak.com
Axios NPM Distribution Compromised in Supply Chain Attack
Description
An unknown threat actor compromised the npm account of an axios maintainer, publishing two malicious versions of the package. These versions introduced a dependency on plain-crypto-js, a newly created malicious package. Despite quick removal, axios's widespread usage led to rapid exposure. The malicious package includes a dropper that downloads and executes platform-specific second-stage payloads, functioning as remote access trojans. These payloads can execute remote shells, inject binaries, browse directories, list processes, and perform system reconnaissance. Organizations are advised to audit their environments, remove malicious artifacts, rotate exposed credentials, investigate potential compromise paths, and monitor for suspicious activity.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves a supply chain compromise of the popular Axios npm package, widely used in JavaScript and Node.js development. An unknown threat actor gained access to the npm account of an Axios maintainer and published two malicious versions of the package. These versions introduced a dependency on a newly created malicious package named plain-crypto-js. The malicious package functions as a dropper that downloads and executes platform-specific second-stage payloads, which are remote access trojans (RATs). These RATs provide attackers with capabilities such as executing remote shells, injecting binaries into processes, browsing file directories, enumerating running processes, and performing system reconnaissance. The attack chain involves credential compromise of the maintainer’s npm account, enabling the attacker to publish malicious code under a trusted package name, thereby increasing the likelihood of widespread infection due to Axios's popularity. Although the malicious versions were quickly removed from the npm registry, the rapid adoption and integration of Axios in many projects led to significant exposure. The threat actor’s use of a newly created malicious dependency complicates detection, as it may not be flagged by traditional supply chain security tools. The attack techniques correspond to several MITRE ATT&CK tactics and techniques, including persistence, defense evasion, execution, and command and control. No CVE identifier or known exploits in the wild have been reported at the time of this analysis. The attack highlights the risks of compromised developer credentials and the importance of securing software supply chains.
Potential Impact
The impact of this supply chain attack is significant due to Axios's widespread use in web and server-side applications globally. Organizations using affected Axios versions risk remote compromise through the installed malicious dependency, potentially leading to unauthorized remote shell access, data exfiltration, lateral movement, and persistent footholds within networks. The attacker’s ability to inject binaries and perform system reconnaissance increases the risk of further exploitation and tailored attacks. This can result in data breaches, intellectual property theft, operational disruption, and reputational damage. The attack also undermines trust in open-source software supply chains, potentially affecting development workflows and increasing operational costs due to required audits and remediation. Although no active exploitation campaigns are currently known, the potential for rapid exploitation remains high given the ease of dependency inclusion in modern development. Organizations that fail to detect and remediate this compromise may face prolonged exposure and elevated risk of secondary attacks.
Mitigation Recommendations
Organizations should immediately audit their software dependencies to identify any use of the malicious Axios versions or the plain-crypto-js package. Remove all instances of these malicious packages from development, build, and production environments. Rotate all credentials that may have been exposed or used in compromised build or deployment pipelines, including npm accounts and related developer credentials. Implement strict access controls and multi-factor authentication (MFA) for all package repository accounts to prevent future credential compromises. Monitor network traffic and endpoint logs for indicators of compromise, such as connections to the domain sfrclak.com or execution of suspicious binaries matching the provided hashes. Employ software composition analysis (SCA) tools to detect unauthorized or malicious dependencies proactively. Conduct thorough forensic investigations to identify potential lateral movement or persistence established by the attacker. Educate development teams on supply chain risks and enforce policies to verify package integrity and provenance before inclusion. Consider implementing automated alerts for unexpected dependency changes and use cryptographic signing of packages where supported. Finally, maintain up-to-date incident response plans tailored to supply chain compromise scenarios.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.wiz.io/blog/axios-npm-compromised-in-supply-chain-attack"]
- Adversary
- null
- Pulse Id
- 69cbb6559ec175684e1e7611
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash58401c195fe0a6204b42f5f90995ece5fab74ce7c69c67a24c61a057325af668 | — | |
hash59336a964f110c25c112bcc5adca7090296b54ab33fa95c0744b94f8a0d80c0f | — | |
hash5bb67e88846096f1f8d42a0f0350c9c46260591567612ff9af46f98d1b7571cd | — | |
hash617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101 | — | |
hash92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a | — | |
hashfcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainsfrclak.com | — |
Threat ID: 69cd1c4ee6bfc5ba1dcfe7d3
Added to database: 4/1/2026, 1:23:26 PM
Last enriched: 4/1/2026, 1:38:30 PM
Last updated: 4/5/2026, 10:02:48 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.