BotBeat
...
← Back

> ▌

axiosaxios
POLICY & REGULATIONaxios2026-04-07

Critical Supply Chain Attack Compromises Popular Axios NPM Package with Remote Access Trojan

Key Takeaways

  • ▸Two malicious Axios npm versions (v1.14.1 and v0.30.4) deployed a platform-specific remote access trojan via a fake post-install dependency called 'plain-crypto-js'
  • ▸Despite only being available for three hours, the attack potentially affected millions of deployments given Axios's 100 million weekly downloads across JavaScript applications
  • ▸The RAT enables threat actors to exfiltrate credentials and execute arbitrary payloads, creating significant risk for follow-on attacks and credential compromise across supply chain
Source:
Hacker Newshttps://blog.talosintelligence.com/axois-npm-supply-chain-incident/↗

Summary

On March 31, 2026, two malicious versions of the widely-used Axios JavaScript library (v1.14.1 and v0.30.4) were deployed to the official npm repository in a sophisticated supply chain attack discovered and investigated by Cisco Talos. Axios is downloaded approximately 100 million times per week, making this a critical security incident affecting potentially millions of applications and organizations. The malicious packages were available for only three hours but introduced a fake runtime dependency that automatically executes a platform-specific remote access trojan (RAT) without user interaction.

The attack leveraged a post-install script that deploys different payloads depending on the operating system: a binary for MacOS, a PowerShell script for Windows, and a Python backdoor for Linux. All payloads communicate with actor-controlled infrastructure to exfiltrate system information and credentials, enabling the threat actors to gain persistent remote access and deploy additional malicious code. Cisco Talos strongly recommends that all organizations immediately roll back to known safe versions (v1.14.0 or v0.30.3), investigate systems that downloaded the malicious packages, and treat all credentials on affected systems as compromised and rotate them immediately.

  • Organizations must immediately roll back to safe versions, investigate all affected systems, and rotate all credentials present on compromised machines

Editorial Opinion

This supply chain attack on Axios represents a critical vulnerability in the open-source JavaScript ecosystem and highlights the persistent risk that popular libraries pose when compromised. The fact that such a widely-downloaded package could be poisoned—even briefly—underscores the need for stronger package integrity verification, faster detection mechanisms, and more robust dependency management practices across the industry. Organizations relying on npm packages should urgently audit their supply chain security posture and implement stricter controls around dependency updates.

MLOps & InfrastructureCybersecurityPrivacy & Data

More from axios

axiosaxios
INDUSTRY REPORT

Axios Supply Chain Attack Exploited Sophisticated Social Engineering Against Open Source Maintainer

2026-04-03
axiosaxios
POLICY & REGULATION

axios Suffers Critical npm Supply Chain Attack; Malicious Versions Distributed for 3 Hours

2026-04-03

Comments

Suggested

AnthropicAnthropic
PRODUCT LAUNCH

Anthropic Launches Project Glasswing: AI-Powered Initiative to Secure Critical Software Infrastructure

2026-04-07
MicrosoftMicrosoft
UPDATE

Microsoft Aspire 13.2 Introduces Agent-Friendly Features for Autonomous Development Workflows

2026-04-07
MetaMeta
RESEARCH

Security Audit of WhatsApp's Private Inference Reveals TEE Vulnerabilities and Best Practices

2026-04-07
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us