Popular Axios npm package compromised to deliver cross-platform malware

April 2, 20262 min read1 sources
Share:
Popular Axios npm package compromised to deliver cross-platform malware

The widely used Axios HTTP client library for JavaScript has been compromised in a significant supply chain attack. Security researchers discovered that two recently published versions of the package on the npm registry, 1.14.1 and 0.30.4, contain malicious code designed to install a trojan on developers' systems.

According to a report from StepSecurity, the attack was executed by injecting a malicious dependency named "plain-crypto-js" into the compromised Axios versions. This method suggests an attacker gained unauthorized access to a project maintainer's account to publish the tainted packages. Once installed, the malicious dependency deploys a cross-platform Remote Access Trojan (RAT).

This type of malware is particularly dangerous as it grants attackers extensive control over an infected machine. A RAT can be used to execute arbitrary commands, access and exfiltrate sensitive files like source code or credentials, and monitor system activity. The malware is engineered to function on Windows, macOS, and Linux, expanding its reach from individual developer workstations to production servers running Node.js applications.

Given Axios's immense popularity, with millions of weekly downloads, the potential impact of this compromise is severe. Countless web applications, backend services, and development environments could be affected, putting organizations at risk of data breaches and further network intrusion.

Developers and organizations using Axios are strongly advised to immediately audit their projects and dependencies. If versions 1.14.1 or 0.30.4 are in use, they should be removed and replaced with a known safe version. This incident highlights the persistent threat of supply chain attacks targeting critical open-source software projects.

Share:

// SOURCES

// RELATED

TrueConf zero-day exploited in attacks targeting Southeast Asian governments

A high-severity flaw in TrueConf video conferencing software was exploited as a zero-day to deliver malicious updates to government networks in Southe

2 min readApr 2

F5 BIG-IP vulnerability under active attack after RCE discovery

A critical F5 BIG-IP vulnerability (CVE-2023-46747) is under active attack, allowing unauthenticated attackers to gain full system control.

2 min readApr 2

Block the prompt, not the work: The end of 'Doctor No'

The traditional 'Doctor No' security approach of blocking new tools is failing. The rise of AI and shadow IT is forcing a shift to secure enablement.

2 min readApr 2

Google patches Vertex AI flaws that allowed researchers to weaponize AI agents

Researchers discovered vulnerabilities in Google's Vertex AI platform that could lead to data theft and resource abuse. Google has since fixed the iss

2 min readApr 2