Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Inside the Axios supply chain compromise - one RAT to rule them all

0
Medium
Published: Wed Apr 01 2026 (04/01/2026, 13:22:54 UTC)
Source: AlienVault OTX General

Description

Elastic Security Labs identified a supply chain compromise of the axios npm package, one of the most depended-upon packages in the JavaScript ecosystem with approximately 100 million weekly downloads. The attacker compromised a maintainer account and published backdoored versions that delivered a cross-platform Remote Access Trojan to macOS, Windows, and Linux systems through a malicious postinstall hook.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 12:14:28 UTC

Technical Analysis

Elastic Security Labs discovered a supply chain attack involving the axios npm package, a critical and heavily depended-upon JavaScript library with approximately 100 million weekly downloads. The attacker compromised a maintainer's npm account, enabling them to publish backdoored versions of axios. These malicious versions include a postinstall hook that executes automatically when the package is installed, deploying a cross-platform Remote Access Trojan (RAT) targeting macOS, Windows, and Linux systems. This RAT allows attackers to gain persistent remote access and control over infected systems, potentially enabling data exfiltration, lateral movement, and further compromise. The attack exploits the trust model inherent in software supply chains, where developers and organizations implicitly trust packages from official repositories. The malicious code is obfuscated (T1027) and uses masquerading techniques (T1036) to evade detection. The postinstall hook (T1143) ensures execution without explicit user action beyond installation. Indicators of compromise include specific malicious file hashes and a command-and-control domain (sfrclak.com). While no active widespread exploitation has been confirmed, the scale of axios usage means the attack could impact a vast number of projects and organizations globally. The absence of a patch or fixed version at the time of reporting increases risk, emphasizing the need for immediate mitigation.

Potential Impact

The compromise of axios, a foundational npm package, poses a severe risk to the global software development ecosystem. Organizations that incorporate axios into their applications or development environments may unknowingly introduce a Remote Access Trojan, leading to unauthorized access to internal systems across multiple operating systems. This can result in data breaches, intellectual property theft, disruption of development pipelines, and potential supply chain contamination affecting downstream users and customers. The cross-platform nature of the RAT increases the attack surface, impacting diverse environments including servers, developer workstations, and CI/CD systems. The trust erosion in npm packages could lead to broader supply chain insecurity, affecting software integrity and reliability. Although currently rated medium severity, the potential for escalation to critical exists if attackers leverage the RAT for widespread espionage, ransomware deployment, or destructive attacks. The attack also highlights the vulnerability of open-source ecosystems to maintainer account compromises, which can have cascading effects on global software supply chains.

Mitigation Recommendations

1. Immediately audit all projects and environments for the presence of the compromised axios versions, focusing on recent package updates and installations. 2. Revert to a known clean version of axios or temporarily remove axios dependencies until a verified patched version is released. 3. Implement strict access controls and multi-factor authentication (MFA) on all package maintainer accounts to prevent unauthorized publishing. 4. Employ software composition analysis (SCA) tools to detect and block malicious or unexpected postinstall scripts in npm packages. 5. Monitor network traffic for connections to known malicious domains such as sfrclak.com and investigate any suspicious communications. 6. Use endpoint detection and response (EDR) solutions to identify behaviors consistent with RAT activity, including unusual process executions and persistence mechanisms. 7. Educate developers and DevOps teams on supply chain risks and encourage verification of package integrity using cryptographic signatures or checksums. 8. Collaborate with npm and open-source communities to improve package publishing security and rapid incident response capabilities. 9. Establish incident response plans specifically addressing supply chain compromises to enable swift containment and remediation. 10. Regularly update and patch all development and production systems to reduce exposure to secondary exploits leveraged by the RAT.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.elastic.co/security-labs/axios-one-rat-to-rule-them-all"]
Adversary
null
Pulse Id
69cd1c2e48c8aeef1f743d7f
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash04e3073b3cd5c5bfcde6f575ecf6e8c1
hash7a9ddef00f69477b96252ca234fcbeeb
hash13ab317c5dcab9af2d1bdb22118b9f09f8a4038e
hasha90c26e7cbb3440ac1cad75cf351cbedef7744a8
hash617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101
hash92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a
hashfcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf

Domain

ValueDescriptionCopy
domainsfrclak.com

Threat ID: 69cd70a4e6bfc5ba1ded84c7

Added to database: 4/1/2026, 7:23:16 PM

Last enriched: 4/2/2026, 12:14:28 PM

Last updated: 4/6/2026, 6:57:53 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses