Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Axios NPM Package Breached in North Korean Supply Chain Attack

0
Low
Vulnerabilityios
Published: Wed Apr 01 2026 (04/01/2026, 08:45:47 UTC)
Source: SecurityWeek

Description

The Axios NPM package was compromised through a supply chain attack attributed to North Korean threat actors. Attackers exploited a long-lived NPM access token to bypass GitHub Actions' OIDC-based CI/CD publishing workflow, enabling them to push backdoored versions of the package. This breach allows malicious code to be distributed to developers and applications relying on Axios, a widely used HTTP client library in JavaScript environments. Although no known exploits in the wild have been reported yet, the potential for widespread impact exists due to Axios's extensive use in web and mobile applications. The attack highlights vulnerabilities in CI/CD pipeline security and token management. Mitigation requires immediate revocation of compromised tokens, strengthening CI/CD authentication mechanisms, and vigilant monitoring of package integrity. Countries with significant software development sectors and heavy reliance on JavaScript ecosystems, including the United States, India, Germany, South Korea, Japan, and the United Kingdom, are most at risk. Given the ease of exploitation and potential for supply chain compromise, the severity is assessed as high despite the current low severity rating. Defenders must prioritize securing CI/CD workflows and verifying package authenticity to prevent similar attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 08:53:29 UTC

Technical Analysis

The Axios NPM package, a popular HTTP client library used extensively in JavaScript and Node.js environments, was targeted in a supply chain attack linked to North Korean threat actors. The attackers leveraged a long-lived NPM access token to circumvent the GitHub Actions OIDC-based CI/CD publishing workflow, which is designed to securely automate package publishing without exposing credentials. By abusing this token, the adversaries were able to push malicious, backdoored versions of Axios to the NPM registry. This method of attack bypasses traditional security controls by exploiting trust in automated CI/CD pipelines and token management practices. The compromised package versions could contain code that exfiltrates data, installs malware, or performs other malicious activities when integrated into applications. Although no active exploitation has been confirmed, the potential reach is significant given Axios's widespread adoption in web, mobile (including iOS), and server-side applications. The incident underscores the risks associated with long-lived tokens and the need for robust CI/CD security, including token rotation, least privilege principles, and enhanced monitoring of package publishing activities. The attack also reflects evolving tactics in supply chain compromises, where adversaries target development infrastructure rather than end-user systems directly.

Potential Impact

This supply chain attack on Axios poses a substantial risk to organizations worldwide that depend on this package for HTTP communications in their applications. If malicious versions are integrated into production environments, attackers could gain unauthorized access to sensitive data, disrupt application functionality, or establish persistent footholds within affected systems. The trust placed in automated CI/CD pipelines means that compromised packages can propagate quickly and widely, potentially affecting thousands of projects and enterprises. The breach could lead to data breaches, intellectual property theft, and reputational damage. Additionally, organizations may face increased costs related to incident response, remediation, and compliance. The attack also highlights systemic vulnerabilities in software supply chains, which can undermine overall software integrity and security. Given the global distribution of Axios users, the impact transcends geographic boundaries, affecting sectors such as finance, healthcare, technology, and government services that rely on secure and reliable software dependencies.

Mitigation Recommendations

Organizations should immediately revoke any long-lived NPM access tokens associated with their CI/CD workflows and enforce short-lived, scoped tokens with minimal privileges. Implement strict token rotation policies and audit token usage regularly. Enhance CI/CD pipeline security by adopting multi-factor authentication (MFA) for publishing workflows and integrating anomaly detection to flag unusual publishing activities. Employ cryptographic signing and verification of packages to ensure integrity before deployment. Monitor NPM package versions for unexpected changes and use tools that verify dependency integrity, such as software composition analysis (SCA) solutions. Educate development teams on secure token management and the risks of supply chain attacks. Consider isolating build environments and restricting network access to reduce the attack surface. Finally, maintain an incident response plan tailored to supply chain compromises to enable rapid containment and remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Threat ID: 69ccdcfde6bfc5ba1daf8eb7

Added to database: 4/1/2026, 8:53:17 AM

Last enriched: 4/1/2026, 8:53:29 AM

Last updated: 4/6/2026, 8:45:41 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses