🚨 If you use Axios in your Node.js projects — read this now. The most downloaded JavaScript library just became a backdoor into your machine. Attackers didn't hack Axios itself. They compromised a maintainer's npm account and slipped in a rogue dependency called plain-crypto-js. Here's what happened silently on install: → Post-install script ran automatically → Detected your OS → Fetched a second-stage payload from a remote server → Installed a Remote Access Trojan (RAT) on your machine → Then deleted itself — leaving zero traces npm audit showed nothing. Your IDE showed nothing. You were owned. Check yourself right now: → Open package.json — are you on a compromised Axios version? → Search node_modules for plain-crypto-js → If found — check immediately if the RAT is active Found it? Deleting the file is NOT enough. Rotate every API key. Every credential. Every token. Now. This is what a modern supply chain attack looks like. Not a phishing email. Not a shady download. Just one npm install. The scariest part? Most developers still think "I'll check tomorrow." Tomorrow is too late. At NodeAscend, security-first development is non-negotiable in everything we ship — AI systems, web apps, all of it. If your team runs Node.js and you're not auditing your dependency tree regularly — let's talk. ♻️ Repost this — one developer in your network needs to see it today. #NodeJS #JavaScript #CyberSecurity #SupplyChainAttack #WebDevelopment #DevSecOps #NodeAscend #OpenSource
Node.js Axios Security Alert: Rogue Dependency Compromise
More Relevant Posts
-
🚨 𝑪𝒓𝒊𝒕𝒊𝒄𝒂𝒍 𝑺𝒆𝒄𝒖𝒓𝒊𝒕𝒚 𝑨𝒍𝒆𝒓𝒕: 𝑨𝒙𝒊𝒐𝒔 𝑺𝒖𝒑𝒑𝒍𝒚 𝑪𝒉𝒂𝒊𝒏 𝑨𝒕𝒕𝒂𝒄𝒌 (𝑨𝒄𝒕𝒊𝒐𝒏 𝑹𝒆𝒒𝒖𝒊𝒓𝒆𝒅) As a developer, I’m closely following a sophisticated supply chain attack that has just hit Axios, one of the most widely used libraries in the JavaScript ecosystem. This isn’t a standard hack; it is a highly targeted Remote Access Trojan (RAT) deployment that compromises both developer machines and CI/CD pipelines. 𝐖𝐡𝐚𝐭 𝐡𝐚𝐩𝐩𝐞𝐧𝐞𝐝? Two malicious versions of Axios were published to the npm registry after a maintainer's account was compromised. These versions include a "RAT dropper" that fetches a second-stage payload tailored to your OS and then deletes its own footprints to evade detection. 𝑨𝒄𝒕𝒊𝒐𝒏 𝒊𝒕𝒆𝒎𝒔 𝒇𝒐𝒓 𝒎𝒚 𝒇𝒆𝒍𝒍𝒐𝒘 𝒅𝒆𝒗𝒆𝒍𝒐𝒑𝒆𝒓𝒔: 𝑪𝒉𝒆𝒄𝒌 𝒚𝒐𝒖𝒓 𝒗𝒆𝒓𝒔𝒊𝒐𝒏𝒔: Verify if you are running axios@1.14.1 or axios@0.30.4. Inspect node_modules: Look for a rogue package called plain-crypto-js@4.2.1. 𝑹𝒐𝒕𝒂𝒕𝒆 𝑪𝒓𝒆𝒅𝒆𝒏𝒕𝒊𝒂𝒍𝒔: If you find a compromise, simply deleting the package is NOT enough. You must immediately roll your AWS credentials, OpenAI API keys, and any other sensitive tokens. 𝑬𝒗𝒂𝒍𝒖𝒂𝒕𝒆 𝑵𝒂𝒕𝒊𝒗𝒆 𝑨𝑷𝑰𝒔: With modern runtimes fully supporting fetch, it’s worth considering if moving away from third-party HTTP clients can reduce your attack surface. In an era of increasing supply chain vulnerabilities, we must prioritize security over convenience. Double-check your dependencies today. Has your team started moving toward native fetch to reduce dependency risks? #JavaScript #WebDevelopment #CyberSecurity #NodeJS #MERNStack #SoftwareEngineering #Axios #InfoSec
To view or add a comment, sign in
-
Your Node.js app probably has at least 3 of these security holes right now. I say this because I've seen them in almost every codebase I've reviewed. Let's fix them before someone else finds them first. Mistake 1: No rate limiting on your API What happens: A single script can send 10,000 requests per minute to your login endpoint. Fix: npm install express-rate-limit — 10 lines of code. Done. Mistake 2: JWT secrets stored in code or with weak values What happens: Your entire auth system can be bypassed if someone gets your secret. Fix: 256-bit secret in .env, never in code, rotate it quarterly. Mistake 3: No input sanitization What happens: NoSQL injection, XSS, and prototype pollution all start here. Fix: Use zod or express-validator on every incoming request body. No exceptions. Mistake 4: Missing security headers What happens: Clickjacking, MIME sniffing, and XSS vectors stay open. Fix: npm install helmet — one line of middleware. Adds 11 security headers instantly. Mistake 5: Unprotected routes in production What happens: Admin endpoints, debug routes, and internal APIs are publicly accessible. Fix: Environment-based route guards + RBAC middleware on every sensitive route. None of these take more than 30 minutes total to implement. All of them can take down your application or expose your users if ignored. Security isn't a feature you add later. It's a foundation you build on from day one. Save this and share it with a developer who needs it 📌 #NodeJS #WebSecurity #BackendDevelopment #FullStackDeveloper #CyberSecurity #API
To view or add a comment, sign in
-
-
Ever wonder how a single 'npm install' can compromise your entire machine? As a MERN stack developer, I’ve been looking into the recent Axios security breach. The "magic" behind the attack lies in a built-in npm feature: the postinstall script. 𝐖𝐡𝐚𝐭 𝐢𝐬 𝐚 𝐩𝐨𝐬𝐭𝐢𝐧𝐬𝐭𝐚𝐥𝐥 𝐬𝐜𝐫𝐢𝐩𝐭? In npm, 'lifecycle scripts' allow packages to automate tasks. A 'postinstall' script runs automatically as soon as a package (and its dependencies) are finished downloading. It was designed for helpful tasks, like compiling native code. 𝐇𝐨𝐰 𝐝𝐨 𝐡𝐚𝐜𝐤𝐞𝐫𝐬 𝐞𝐱𝐩𝐥𝐨𝐢𝐭 𝐢𝐭? The danger is that these scripts run with the same permissions as the user who typed the command. 𝑯𝒆𝒓𝒆 𝒊𝒔 𝒕𝒉𝒆 𝒕𝒚𝒑𝒊𝒄𝒂𝒍 𝒇𝒍𝒐𝒘 𝒐𝒇 𝒂 𝒅𝒆𝒑𝒆𝒏𝒅𝒆𝒏𝒄𝒚 𝒂𝒕𝒕𝒂𝒄𝒌: ⦿ The "Dropper": The hacker injects a "postinstall": "node setup.js" line into the package.json of a compromised library. ⦿ Silent Execution: When you run 'npm install', your terminal silently executes that setup.js file. You usually won't see any red flags in the console. ⦿ The Payload: That script reaches out to a remote server to download a malicious payload—like a Remote Access Trojan (RAT)—specifically designed for your Operating System. ⦿ The Cleanup: Modern attacks (like the recent Axios one) are sophisticated enough to delete the malicious script and the evidence from your node_modules immediately after running, making 'npm audit' believe everything is fine. 𝐇𝐨𝐰 𝐭𝐨 𝐩𝐫𝐨𝐭𝐞𝐜𝐭 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟: ➊ Use --ignore-scripts: When installing a new or untrusted package, run 'npm install --ignore-scripts'. This prevents any lifecycle scripts from executing. ➋ Audit your CI/CD: Ensure your build servers are isolated and don't have unnecessary access to sensitive environment variables during the install phase. ➌ Move to Native: Where possible, use native APIs like 'fetch' to reduce the number of third-party dependencies in your graph. Security is a shared responsibility. Every dependency you add is a door you're leaving unlocked—make sure you know who has the key. #WebDevelopment #CyberSecurity #NodeJS #NPM #SoftwareEngineering #Programming #MERNStack #TechSecurity
To view or add a comment, sign in
-
Supply chain attack. Malicious code injection. Trojanized code. Why are these attacks so dangerous? A week ago, I was targeted through malicious code hidden inside a take-home assignment. Then came the "LiteLLM" incident. And right after that, the "Axios" supply chain attack. That hit close to home for me, especially because I often spin up small pet projects just to explore different technologies and frameworks hands-on. ⚠️ What many developers still underestimate: These attacks often do not hit your users first. They hit YOU first! A very normal flow can look like this: - npx create-react-app my-app - cd my-app - npm install some-package - npm start 🚨 If something in that chain is compromised, malicious code may already execute during install, startup, build, or through trusted config and tooling files. And at that point, the attacker may not care about your app at all. They may care about: - GitHub tokens - npm tokens - SSH keys - cloud credentials - .env files - internal company access - wallet keys 💥 That is what makes these attacks so nasty. Your project may still work exactly as expected. The app starts. The build passes. Everything looks normal. And your data may already be gone. That is why incidents like LiteLLM and Axios matter so much. This is not only about vulnerable production apps or customer data leaks. It is also about developer machines, CI/CD pipelines, secrets, and trust in the everyday development flow itself. 🛡️ There is no 100% protection. But you can reduce the risk: - do not run unknown projects blindly on your main machine - review scripts and config files before starting (AI can help with it BTW) - use Docker or a separate VM for new or suspicious projects - avoid keeping unnecessary tokens and secrets locally Today, even a regular "npm install" can be a security event. Do you or your team already have rules for safely running new projects and dependencies locally? #cybersecurity #supplychainsecurity #devsecops #softwaresecurity #javascript #nodejs #frontend #webdevelopment #opensource
To view or add a comment, sign in
-
-
🚨 A Wake-Up Call for the JavaScript Ecosystem 🚨 The widely trusted HTTP client 𝗔𝘅𝗶𝗼𝘀 (with over 1B weekly downloads) was recently at the center of a serious supply chain security incident. Here’s what happened: • The maintainer’s account was compromised • Malicious versions were published (e.g., 1.14.1 and 0.30.4) • One of those versions reportedly crossed 𝟭𝟬𝗠+ 𝗱𝗼𝘄𝗻𝗹𝗼𝗮𝗱𝘀 before being caught • A fake dependency "𝗽𝗹𝗮𝗶𝗻-𝗰𝗿𝘆𝗽𝘁𝗼-𝗷𝘀" was introduced • It executed a 𝗽𝗼𝘀𝘁𝗶𝗻𝘀𝘁𝗮𝗹𝗹 script, injecting malicious code into systems • Then quietly removed itself to avoid detection This is especially dangerous because many projects use version ranges like `^1.13.6`, which allow automatic upgrades to minor versions — meaning a simple `npm install` could pull in compromised code without any warning. 💡 𝗞𝗲𝘆 𝗧𝗮𝗸𝗲𝗮𝘄𝗮𝘆𝘀: • Lock critical dependencies to exact versions (no `^` or `~`) • Always review dependency changes before upgrading • Treat postinstall scripts as a potential attack surface • Use lockfiles and security auditing tools • Don’t blindly trust even the most popular packages This incident is a reminder: Open source is powerful, but it runs on trust — and trust can be exploited. Stay safe, audit your dependencies, and think twice before auto-updating. #CyberSecurity #JavaScript #OpenSource #SupplyChainAttack #NodeJS #WebDevelopment #InfoSec
To view or add a comment, sign in
-
🚨 Heads up: Serious Axios npm supply chain attack Recently, attackers got access to the npm account of an Axios maintainer and published two malicious versions (1.14.1 and 0.30.4). There’s no vulnerability in Axios itself - this was purely a trust attack. The malicious versions quietly added a hidden dependency that runs during npm install and installs a cross-platform RAT. 💥 Why this matters Axios is used everywhere (especially in React apps). Any project using default version ranges (^) could have pulled the malicious update automatically. If that happened, the attacker may have had access to everything on that system - including API keys, tokens, and CI/CD secrets. 🔍 What to check • Run npm list axios and look for affected versions • Check if plain-crypto-js exists in node_modules • Look for unusual outbound traffic (e.g. to suspicious domains) 🚨 If you were affected Don’t try to clean it manually. Rebuild the system and rotate all credentials immediately. ⚠️ Extra caution If you’re using AI tools like Cursor or Claude to install dependencies or run commands, double-check what’s being installed. Don’t blindly trust auto-suggested packages. 🔐 Bottom line If your system installed one of the affected versions, assume compromise and act fast. #CyberSecurity #Infosec #SupplyChainAttack #NodeJS #ReactJS #React #Axios #JavaScript #WebSecurity #AppSec #AI #Cursor #Claude
To view or add a comment, sign in
-
-
One of the most widely used JavaScript libraries in the world just became part of a supply chain attack. Axios, with over 300 million weekly downloads, was recently affected by malicious npm versions that distributed a Remote Access Trojan (RAT). The attack didn’t rely on phishing, exploits, or user mistakes. It used something far more dangerous: normal development workflows. A simple npm install or npm update was enough to pull compromised code into applications. From there, attackers could establish persistence, access sensitive data, and potentially move further into internal environments. This is what makes modern supply chain attacks so effective. They don’t need to break into systems, no, it is more elegant, they are invited in as dependencies. For many organisations, axios is not just another library. It sits deep inside backend services, frontend applications, APIs, and CI/CD pipelines. That means the blast radius of such an incident is not limited to a single system, but can extend across entire development and production environments. The uncomfortable reality is that developers did everything “right”. They used trusted libraries, followed standard processes, and relied on official package managers. And still, the compromise happened. Yeah, sounds scary. This is a strong reminder that: > open-source dependencies are part of your attack surface, > trust in packages is not static, > and software supply chain security is no longer optional. Monitoring dependency integrity, validating package sources, and having visibility into what actually runs in your environments is becoming just as important as traditional security controls. Because today, attackers don’t need to exploit your system, they just need to become part of your codebase. Sources: GitHub issue discussions, StepSecurity analysis, and reporting by The Hacker News. #CyberSecurity #SupplyChainSecurity #OpenSource #npm #JavaScript #DevSecOps #ThreatIntelligence #InfoSec Photo by Lucas Andrade: https://lnkd.in/d9-RbvAR
To view or add a comment, sign in
-
-
Axios npm Package Compromised — What Every Developer Needs to Know On March 31, 2026, attackers hijacked the npm account of the lead Axios maintainer and published two malicious versions of one of the most widely used JavaScript libraries (~100M weekly downloads). Affected versions: • axios@1.14.1 • axios@0.30.4 These versions silently installed a cross-platform Remote Access Trojan (RAT) the moment anyone ran npm install — stealing cloud credentials, API tokens, SSH keys, and giving attackers persistent access to the machine. The entire compromise took ~15 seconds. The malicious packages were removed within ~3 hours, but if you or your CI/CD pipeline ran npm install during that window (00:21–03:15 UTC, March 31), assume full compromise. ✅ Immediate steps: 1️⃣ Check your package-lock.json or yarn.lock for axios@1.14.1, axios@0.30.4, or plain-crypto-js 2️⃣ Downgrade: npm install axios@1.14.0 --ignore-scripts 3️⃣ Delete node_modules/plain-crypto-js 4️⃣ Rotate ALL credentials — API keys, cloud access keys, tokens. Revoke and reissue, don't just rotate. 5️⃣ If compromised: isolate the machine and re-image. Do not attempt in-place cleanup. Supply chain attacks are becoming more frequent and more sophisticated. This is a reminder to verify package provenance, pin your dependencies, and never blindly trust the npm registry. Stay safe out there. Share this — your network needs to know. 🔁 #CyberSecurity #SupplyChainAttack #JavaScript #npm #Axios #DevSecOps #OpenSource #React #ReactNative
To view or add a comment, sign in
-
🚨 ALERT FOR EVERY JAVASCRIPT DEVELOPER 🚨 If you use Axios in your Node.js, React, or any JS project — READ THIS NOW. On March 30–31, 2026, a sophisticated hacker compromised the npm account of Axios's primary maintainer and published two backdoored versions: 🔴 axios@1.14.1 🔴 axios@0.30.4 These versions silently install a Remote Access Trojan (RAT) on your machine — Windows, macOS, and Linux all affected — the moment you run: npm install The attack was caught in ~3 hours, but not before thousands of developers may have installed the malicious code. ━━━━━━━━━━━━━━━━━━━━━━ 🕵️ HOW IT WORKED ━━━━━━━━━━━━━━━━━━━━━━ The attacker hijacked jasonsaayman's npm account (Axios lead maintainer), changed the registered email to an anonymous ProtonMail address, and injected a hidden dependency called plain-crypto-js@4.2.1 — a fake package disguised as the real crypto-js. This package runs a postinstall script that: ✅ Drops a RAT (Remote Access Trojan) ✅ Contacts attacker's C2 server in seconds ✅ Then DELETES itself to hide all traces Google's Threat Intelligence team has attributed this to North Korean hackers (tracked as UNC1069). ━━━━━━━━━━━━━━━━━━━━━━ ✅ WHAT YOU MUST DO RIGHT NOW ━━━━━━━━━━━━━━━━━━━━━━ 1️⃣ Check your package-lock.json or yarn.lock for axios@1.14.1 or axios@0.30.4 2️⃣ Downgrade immediately: npm install axios@1.14.0 3️⃣ Delete the malicious folder: rm -rf node_modules/plain-crypto-js 4️⃣ Reinstall with: npm install --ignore-scripts 5️⃣ Rotate ALL credentials on affected systems — npm tokens, SSH keys, cloud keys, CI/CD secrets 6️⃣ Block C2 domain: sfrclak[.]com at your firewall ━━━━━━━━━━━━━━━━━━━━━━ 💡 LESSON FOR EVERY DEVELOPER ━━━━━━━━━━━━━━━━━━━━━━ Supply chain attacks are the new frontier of hacking. The attacker didn't hack your app — they hacked the tool your app trusts. ✔ Always lock your dependency versions (no floating ^ or ~) ✔ Use --ignore-scripts in CI/CD pipelines as a standard practice ✔ Enable npm provenance checks (--provenance flag) ✔ Monitor your dependencies with tools like Snyk or Socket Security Axios has 100 MILLION weekly downloads. This could be one of the largest npm supply chain attacks in history. Stay safe. Share this with your developer network. 🙏 #JavaScript #NodeJS #WebSecurity #npm #SupplyChainAttack #CyberSecurity #Laravel #ReactJS #OpenSource #InfoSec #DeveloperAlert
To view or add a comment, sign in
-
Explore related topics
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development