Inside the Axios supply chain compromise - one RAT to rule them all
Elastic Security Labs identified a supply chain compromise of the axios npm package, one of the most depended-upon packages in the JavaScript ecosystem with approximately 100 million weekly downloads. The attacker compromised a maintainer account and published backdoored versions that delivered a cross-platform Remote Access Trojan to macOS, Windows, and Linux systems through a malicious postinstall hook.
AI Analysis
Technical Summary
Elastic Security Labs discovered a supply chain attack involving the axios npm package, a critical and heavily depended-upon JavaScript library with approximately 100 million weekly downloads. The attacker compromised a maintainer's npm account, enabling them to publish backdoored versions of axios. These malicious versions include a postinstall hook that executes automatically when the package is installed, deploying a cross-platform Remote Access Trojan (RAT) targeting macOS, Windows, and Linux systems. This RAT allows attackers to gain persistent remote access and control over infected systems, potentially enabling data exfiltration, lateral movement, and further compromise. The attack exploits the trust model inherent in software supply chains, where developers and organizations implicitly trust packages from official repositories. The malicious code is obfuscated (T1027) and uses masquerading techniques (T1036) to evade detection. The postinstall hook (T1143) ensures execution without explicit user action beyond installation. Indicators of compromise include specific malicious file hashes and a command-and-control domain (sfrclak.com). While no active widespread exploitation has been confirmed, the scale of axios usage means the attack could impact a vast number of projects and organizations globally. The absence of a patch or fixed version at the time of reporting increases risk, emphasizing the need for immediate mitigation.
Potential Impact
The compromise of axios, a foundational npm package, poses a severe risk to the global software development ecosystem. Organizations that incorporate axios into their applications or development environments may unknowingly introduce a Remote Access Trojan, leading to unauthorized access to internal systems across multiple operating systems. This can result in data breaches, intellectual property theft, disruption of development pipelines, and potential supply chain contamination affecting downstream users and customers. The cross-platform nature of the RAT increases the attack surface, impacting diverse environments including servers, developer workstations, and CI/CD systems. The trust erosion in npm packages could lead to broader supply chain insecurity, affecting software integrity and reliability. Although currently rated medium severity, the potential for escalation to critical exists if attackers leverage the RAT for widespread espionage, ransomware deployment, or destructive attacks. The attack also highlights the vulnerability of open-source ecosystems to maintainer account compromises, which can have cascading effects on global software supply chains.
Mitigation Recommendations
1. Immediately audit all projects and environments for the presence of the compromised axios versions, focusing on recent package updates and installations. 2. Revert to a known clean version of axios or temporarily remove axios dependencies until a verified patched version is released. 3. Implement strict access controls and multi-factor authentication (MFA) on all package maintainer accounts to prevent unauthorized publishing. 4. Employ software composition analysis (SCA) tools to detect and block malicious or unexpected postinstall scripts in npm packages. 5. Monitor network traffic for connections to known malicious domains such as sfrclak.com and investigate any suspicious communications. 6. Use endpoint detection and response (EDR) solutions to identify behaviors consistent with RAT activity, including unusual process executions and persistence mechanisms. 7. Educate developers and DevOps teams on supply chain risks and encourage verification of package integrity using cryptographic signatures or checksums. 8. Collaborate with npm and open-source communities to improve package publishing security and rapid incident response capabilities. 9. Establish incident response plans specifically addressing supply chain compromises to enable swift containment and remediation. 10. Regularly update and patch all development and production systems to reduce exposure to secondary exploits leveraged by the RAT.
Affected Countries
United States, India, Germany, United Kingdom, China, Canada, Australia, France, Japan, Brazil, Netherlands, South Korea, Russia, Israel, Singapore
Indicators of Compromise
- hash: 04e3073b3cd5c5bfcde6f575ecf6e8c1
- hash: 7a9ddef00f69477b96252ca234fcbeeb
- hash: 13ab317c5dcab9af2d1bdb22118b9f09f8a4038e
- hash: a90c26e7cbb3440ac1cad75cf351cbedef7744a8
- hash: 617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101
- hash: 92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a
- hash: fcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf
- domain: sfrclak.com
Inside the Axios supply chain compromise - one RAT to rule them all
Description
Elastic Security Labs identified a supply chain compromise of the axios npm package, one of the most depended-upon packages in the JavaScript ecosystem with approximately 100 million weekly downloads. The attacker compromised a maintainer account and published backdoored versions that delivered a cross-platform Remote Access Trojan to macOS, Windows, and Linux systems through a malicious postinstall hook.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Elastic Security Labs discovered a supply chain attack involving the axios npm package, a critical and heavily depended-upon JavaScript library with approximately 100 million weekly downloads. The attacker compromised a maintainer's npm account, enabling them to publish backdoored versions of axios. These malicious versions include a postinstall hook that executes automatically when the package is installed, deploying a cross-platform Remote Access Trojan (RAT) targeting macOS, Windows, and Linux systems. This RAT allows attackers to gain persistent remote access and control over infected systems, potentially enabling data exfiltration, lateral movement, and further compromise. The attack exploits the trust model inherent in software supply chains, where developers and organizations implicitly trust packages from official repositories. The malicious code is obfuscated (T1027) and uses masquerading techniques (T1036) to evade detection. The postinstall hook (T1143) ensures execution without explicit user action beyond installation. Indicators of compromise include specific malicious file hashes and a command-and-control domain (sfrclak.com). While no active widespread exploitation has been confirmed, the scale of axios usage means the attack could impact a vast number of projects and organizations globally. The absence of a patch or fixed version at the time of reporting increases risk, emphasizing the need for immediate mitigation.
Potential Impact
The compromise of axios, a foundational npm package, poses a severe risk to the global software development ecosystem. Organizations that incorporate axios into their applications or development environments may unknowingly introduce a Remote Access Trojan, leading to unauthorized access to internal systems across multiple operating systems. This can result in data breaches, intellectual property theft, disruption of development pipelines, and potential supply chain contamination affecting downstream users and customers. The cross-platform nature of the RAT increases the attack surface, impacting diverse environments including servers, developer workstations, and CI/CD systems. The trust erosion in npm packages could lead to broader supply chain insecurity, affecting software integrity and reliability. Although currently rated medium severity, the potential for escalation to critical exists if attackers leverage the RAT for widespread espionage, ransomware deployment, or destructive attacks. The attack also highlights the vulnerability of open-source ecosystems to maintainer account compromises, which can have cascading effects on global software supply chains.
Mitigation Recommendations
1. Immediately audit all projects and environments for the presence of the compromised axios versions, focusing on recent package updates and installations. 2. Revert to a known clean version of axios or temporarily remove axios dependencies until a verified patched version is released. 3. Implement strict access controls and multi-factor authentication (MFA) on all package maintainer accounts to prevent unauthorized publishing. 4. Employ software composition analysis (SCA) tools to detect and block malicious or unexpected postinstall scripts in npm packages. 5. Monitor network traffic for connections to known malicious domains such as sfrclak.com and investigate any suspicious communications. 6. Use endpoint detection and response (EDR) solutions to identify behaviors consistent with RAT activity, including unusual process executions and persistence mechanisms. 7. Educate developers and DevOps teams on supply chain risks and encourage verification of package integrity using cryptographic signatures or checksums. 8. Collaborate with npm and open-source communities to improve package publishing security and rapid incident response capabilities. 9. Establish incident response plans specifically addressing supply chain compromises to enable swift containment and remediation. 10. Regularly update and patch all development and production systems to reduce exposure to secondary exploits leveraged by the RAT.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.elastic.co/security-labs/axios-one-rat-to-rule-them-all"]
- Adversary
- null
- Pulse Id
- 69cd1c2e48c8aeef1f743d7f
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash04e3073b3cd5c5bfcde6f575ecf6e8c1 | — | |
hash7a9ddef00f69477b96252ca234fcbeeb | — | |
hash13ab317c5dcab9af2d1bdb22118b9f09f8a4038e | — | |
hasha90c26e7cbb3440ac1cad75cf351cbedef7744a8 | — | |
hash617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101 | — | |
hash92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a | — | |
hashfcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainsfrclak.com | — |
Threat ID: 69cd70a4e6bfc5ba1ded84c7
Added to database: 4/1/2026, 7:23:16 PM
Last enriched: 4/2/2026, 12:14:28 PM
Last updated: 4/6/2026, 6:57:53 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.