If you are using Axios in your projects, stop for 2 minutes and check your installed version. Two malicious Axios versions were recently published to npm after an attacker gained access to a maintainer’s credentials. The compromised versions are: 1. axios@1.14.1 2. axios@0.30.4 These versions secretly installed another package: < plain-crypto-js@4.2.1 > That package contained a Remote Access Trojan (RAT). What makes this attack scary is that after installation, it cleaned itself up. So even if you later checked: * node_modules * npm audit * package.json * installed package files …everything could look completely normal. If your project, local machine, or CI/CD pipeline installed one of these versions, your environment may have been compromised. Run these commands right now: * npm ls axios * npm ls plain-crypto-js If you find either affected version, immediately: * rm -rf node_modules package-lock.json * npm install axios@latest Also rotate: * API keys * .env secrets * JWT secrets * npm tokens * SSH keys * CI/CD credentials As frontend developers, we often trust npm packages because they are used by millions of projects. But this incident is a reminder that even the most popular libraries can become a target. Always: * lock your package versions * review dependency changes * enable 2FA on npm * avoid blindly using ^ in critical packages A single npm install can sometimes become a security issue. Stay safe and check your projects today. #javascript #reactjs #nodejs #frontenddevelopment #webdevelopment #axios #cybersecurity #npm #developers #programming
Compromised Axios Versions: Check Your Projects Now
More Relevant Posts
-
🚨 Axios NPM Supply Chain Attack — A Wake-Up Call for Developers Recently, the JavaScript ecosystem witnessed a serious security incident involving Axios, one of the most widely used HTTP libraries. 📅 Around March 30–31, 2026, attackers compromised the npm publishing access and released malicious versions of Axios: axios@1.14.1 axios@0.30.4 These versions included a hidden dependency that deployed a Remote Access Trojan (RAT) — potentially allowing attackers to: 🔐 Access sensitive environment variables 🧑💻 Execute remote commands 📡 Exfiltrate API keys and tokens ⚠️ Important Clarification This was NOT a flaw in Axios itself, but a supply chain attack targeting the distribution layer (npm). 🛠️ What should developers do? ✅ Check your project dependencies: npm list axios ✅ If affected versions were used: Rotate all API keys, tokens, and secrets Reinstall dependencies (clean install) Redeploy your application Assume possible compromise and investigate logs ✅ Upgrade immediately to a safe/latest version: npm install axios@latest 🧠 Key Takeaways Even trusted libraries can become attack vectors Always lock dependency versions Monitor supply chain security (npm, GitHub, CI/CD) Security is not optional — it’s part of development 💬 Have you checked your projects yet? #CyberSecurity #JavaScript #Axios #NPM #SupplyChainAttack #WebDevelopment #InfoSec #Developers
To view or add a comment, sign in
-
-
🚨 Critical Security Alert for JavaScript Developers — Axios npm Package Compromised If you're using Axios in any of your Node.js or frontend projects, please read this immediately. On March 31, 2026, a sophisticated supply chain attack hit Axios — one of npm's most downloaded packages with 100M+ weekly downloads. What happened? The lead maintainer's npm account was hijacked. Attackers published two malicious versions: ▶ axios@1.14.1 ▶ axios@0.30.4 These versions silently injected a malicious dependency (plain-crypto-js@4.2.1) that installs a Remote Access Trojan (RAT) on your machine — targeting Windows, macOS, and Linux. It self-destructs after execution, so npm audit won't catch it. Check if you're affected: npm list axios | grep -E "1\.14\.1|0\.30\.4" ls node_modules/plain-crypto-js && echo "COMPROMISED" Immediate steps: ✅ Downgrade to axios@1.14.0 or axios@0.30.3 ✅ Pin your version in package.json + lockfile ✅ Rotate ALL credentials — API keys, AWS keys, .env secrets, SSH keys ✅ Use npm ci instead of npm install in CI/CD pipelines The lesson here? This wasn't random. The malicious dependency was pre-staged 18 hours in advance. Three OS-specific RAT payloads were pre-built. Both release branches were hit in under 40 minutes. Open source supply chain attacks are becoming more targeted and sophisticated. As developers, we need to: 🔒 Pin dependencies in lockfiles 🔒 Audit postinstall scripts 🔒 Monitor for unexpected outbound connections in build environments Stay safe out there. Share this with your team. 🙏 #JavaScript #WebDevelopment #CyberSecurity #npm #NodeJS #SupplyChainAttack #OpenSource #MERN #FrontendDevelopment #DevSecOps
To view or add a comment, sign in
-
-
🚨 URGENT: Axios Supply Chain Attack – Action Required Immediately The popular axios npm package has been compromised in a sophisticated supply chain attack. If you are a JavaScript/TypeScript developer, please check your package-lock.json or yarn.lock files right now. 🔍 What Happened? Malicious versions of Axios were released that include a hidden, unauthorized dependency called plain-crypto-js. This is a classic supply chain attack designed to execute code or steal data during the npm install process. 🚩 Affected Versions: axios@1.14.1 axios@0.30.4 If you have run npm install or update recently and landed on these versions, your environment is likely exposed. 🛠️ Immediate Response Plan: Verify Your Version: Check your current installation. Downgrade Immediately: Revert to safe versions: Change 1.14.1 → 1.14.0 Change 0.30.4 → 0.30.3 Clean Your Environment: Manually check for and delete the directory node_modules/plain-crypto-js if it exists. Rotate Your Secrets: As a standard security precaution, rotate any API keys, database credentials, or environment secrets that were present on the affected machine. 🛡️ Lessons for Developers Supply chain security is more important than ever. Always consider using tools like npm audit, socket.dev, or Snyk to catch these vulnerabilities before they reach your production builds. Please share this with your network to help fellow developers secure their builds! #Javascript #NodeJS #WebDevelopment #CyberSecurity #Axios #NPM #Programming #SecurityAlert #SupplyChainAttack
To view or add a comment, sign in
-
-
CRITICAL SECURITY ALERT FOR DEVELOPERS 🚨 One of the most downloaded packages on npm, axios, is currently undergoing a live supply chain attack. What happened, A maintainer's npm account was compromised, allowing attackers to publish malicious versions of the library. These versions include a hidden dependency called plain-crypto-js which executes a Remote Access Trojan (RAT) on your machine or server. ⚠️ DO NOT INSTALL OR UPDATE TO THESE VERSION, axios@1.14.1 axios@0.30.4 What you need to do RIGHT NOW, Search package-lock.json, yarn.lock, or pnpm-lock.yaml for axios@1.14.1, axios@0.30.4, or the malicious sub-dependency plain-crypto-js. Roll back immediately, If you find these versions, roll back to axios@1.14.0 or axios@0.30.3. Assume Compromise, If these versions were installed in your environment (especially between 00:21 and 03:15 UTC on March 31, 2026), treat those machines, CI/CD runners, and developer workstations as compromised. Rotate your keys and secrets immediately. Audit CI/CD: Ensure your build pipelines haven't cached these malicious versions. This is a textbook supply chain attack bypassing standard GitHub CI/CD workflows. Stay safe and spread the word to your fellow engineers! #CyberSecurity #Javascript #NodeJS #WebDevelopment #Infosec #npm #Axios #SupplyChainAttack #Coding
To view or add a comment, sign in
-
Working in Software is not safe anymore.... and ANYONE can fall for this attack without even knowing it. 🤯 I watched a YouTube video yesterday explaining a very sophisticated attack (apparently from North Korea) that happened recently in the open source package called Axios. And in a world where most of Software is now built with a JavaScript framework (React, Node, Angular, Next, Nest, etc...) this is a huge problem. If you're not familiar with Axios, it's a widely used JavaScript library for making HTTP requests. The summary of the attack was that someone obtained one of the Axios open-source collaborator's keys, logged in as that person, and added a new dependency. When downloaded and run, this dependency downloads malicious code onto the machine and grants the attacker full control. The problem here is that anyone working on their projects would just download or update Axios in their code, and run it without hesitation, after all, it's a very popular and "therefore safe" library... right? I don't know... but I'm thinking about installing a virtual machine only with my dev environment in it. What are your thoughts on this? #SoftwareEngineering #CyberSecurity #NodeJS #NPM #BackendEngineering #TechLeadership
To view or add a comment, sign in
-
-
I'm not a huge fan of axios - never was. I think it's for lazy devs not owning their codebase. Axios is not really solving anything for me. It's adding bloat to a code base that can easily use native fetch even in a thin internal wrapper that does the error handling and serialization natively. But as long as we have devs installing is-ten-thousand or is-odd we got these kind of issues. Sad but true.
Senior Fullstack Engineer | Modernising Legacy Systems & Building New Ones Efficiently | React, Node, Spring | TypeScript/Java
Working in Software is not safe anymore.... and ANYONE can fall for this attack without even knowing it. 🤯 I watched a YouTube video yesterday explaining a very sophisticated attack (apparently from North Korea) that happened recently in the open source package called Axios. And in a world where most of Software is now built with a JavaScript framework (React, Node, Angular, Next, Nest, etc...) this is a huge problem. If you're not familiar with Axios, it's a widely used JavaScript library for making HTTP requests. The summary of the attack was that someone obtained one of the Axios open-source collaborator's keys, logged in as that person, and added a new dependency. When downloaded and run, this dependency downloads malicious code onto the machine and grants the attacker full control. The problem here is that anyone working on their projects would just download or update Axios in their code, and run it without hesitation, after all, it's a very popular and "therefore safe" library... right? I don't know... but I'm thinking about installing a virtual machine only with my dev environment in it. What are your thoughts on this? #SoftwareEngineering #CyberSecurity #NodeJS #NPM #BackendEngineering #TechLeadership
To view or add a comment, sign in
-
-
If you are using Axios in your projects, stop for 2 minutes and check your installed version. Two malicious Axios versions were recently published to npm after an attacker gained access to a maintainer’s credentials. The compromised versions are: 1. axios@1.14.1 2. axios@0.30.4 These versions secretly installed another package: < plain-crypto-js@4.2.1 > That package contained a Remote Access Trojan (RAT). What makes this attack scary is that after installation, it cleaned itself up. So even if you later checked: * node_modules * npm audit * package.json * installed package files …everything could look completely normal. If your project, local machine, or CI/CD pipeline installed one of these versions, your environment may have been compromised. Run these commands right now: * npm ls axios * npm ls plain-crypto-js If you find either affected version, immediately: * rm -rf node_modules package-lock.json * npm install axios@latest Also rotate: * API keys * .env secrets * JWT secrets * npm tokens * SSH keys * CI/CD credentials As frontend developers, we often trust npm packages because they are used by millions of projects. But this incident is a reminder that even the most popular libraries can become a target. Always: * lock your package versions * review dependency changes * enable 2FA on npm * avoid blindly using ^ in critical packages A single npm install can sometimes become a security issue. Stay safe and check your projects today. hashtag #javascript hashtag #reactjs hashtag #nodejs hashtag #frontenddevelopment hashtag #webdevelopment hashtag #axios hashtag #cybersecurity hashtag #npm hashtag #developers hashtag #programming
To view or add a comment, sign in
-
-
🚨 Your npm install might have just leaked your secrets… Yes, really. A recent Axios supply chain attack compromised trusted versions of a library millions of developers use daily. ⚠️ The problem Versions 1.14.1 and 0.30.4 were infected with hidden malicious code. Behind the scenes, a fake dependency (`plain-crypto-js`) was silently installed and executed. 💥 Result? Your system could expose: * API keys * Environment variables * Login credentials 🧠 How this happened * A maintainer’s npm account got hijacked * Malicious versions were published directly to npm * No code review. No warning. Just trust exploited. 🎯 Why this matters Modern development runs on trust: * We trust open-source packages * We trust auto-updates (`^`, `~`) * We trust install scripts 👉 Attackers know this — and they’re targeting it. 🚑 What you should do NOW * Run: `npm list axios` * Downgrade if needed * Delete & reinstall dependencies * Rotate ALL credentials * Assume compromise if affected 🔐 Reality check Your biggest vulnerability might not be your code… …it’s your dependencies. #CyberSecurity #JavaScript #NodeJS #DevSecOps #SupplyChainAttack #Axios #ReactJS #ReactNative
To view or add a comment, sign in
-
-
🚨Major Supply Chain Attack on npm’s Axios Library One of the most widely used HTTP clients in the JavaScript ecosystem Axios, was recently at the center of a serious supply chain attack. 📅 What happened? On March 30–31, 2026, attackers compromised a maintainer account on npm and published malicious versions of Axios. ⚠️ Impact: • Injected a Remote Access Trojan (RAT) • Potential exposure of: • API keys • SSH credentials • Environment variables • Affected anyone who installed the package during the attack window (~2–3 hours) 💡 Why this matters This isn’t just about Axios, it’s a wake up call for the entire developer ecosystem. Even the most trusted libraries can become attack vectors. 🔐 Key Takeaways for Developers: • Always lock dependencies (package-lock.json / yarn.lock) • Avoid blind installs, review updates before deploying • Use tools like npm audit, Snyk, or Dependabot • Restrict outbound requests to trusted domains (prevent SSRF) • Monitor unusual behavior in CI/CD pipelines 🚀 Lesson: Security is no longer optional, it’s part of development. Supply chain attacks are rising, and awareness is our first defense. #CyberSecurity #JavaScript #NodeJS #React #WebDevelopment #DevSecOps #SupplyChainAttack #Axios #NPM #SoftwareEngineering #InfoSec #Developers #TechNews #SecurityAwareness #Coding
To view or add a comment, sign in
-
-
🚨 Critical Security Alert for JavaScript Developers Using Axios 🚨 If your project relies on Axios, this is something you cannot afford to ignore. A sophisticated supply chain attack has been identified, targeting specific Axios versions released on March 31, 2026. These compromised versions include a malicious dropper capable of affecting both local development environments and production systems. Here is a clear breakdown to help you assess and respond immediately: 🔍 1. Check If You’re Affected Audit your dependencies for these versions: Axios v1.14.1 Axios v0.30.4 Quick command: npm list axios Or search directly in your lock files: grep -E "1\.14\.1|0\.30\.4" package-lock.json 🛡️ 2. Look for the Malicious Dependency The attack introduces a hidden package: plain-crypto-js Check if it exists: node_modules/plain-crypto-js If found, treat your system as potentially compromised. 🚩 3. Identify Indicators of Compromise (IoCs) Depending on your OS, check for these suspicious files: Windows: %PROGRAMDATA%\wt.exe macOS: /Library/Caches/com.apple.act.mond Linux: /tmp/ld.py Presence of any of these strongly indicates malicious activity. ⚡ 4. Immediate Actions (Do Not Delay) If your system is affected: Isolate the machine Disconnect from the internet immediately to prevent data exfiltration. Downgrade Axios Move to safe versions: v1.14.0 v0.30.3 Rotate ALL secrets This includes: Cloud credentials (AWS, Azure, etc.) GitHub tokens npm tokens Database credentials Rebuild from scratch Especially for production systems, perform a clean redeploy from a trusted state. 💡 Final Thought This is a strong reminder that even widely trusted libraries can become attack vectors. Regular audits, dependency monitoring, and security hygiene are no longer optional. Stay safe. Review your projects today. #CyberSecurity #JavaScript #WebDevelopment #OpenSource #SupplyChainAttack #NodeJS #React #Frontend #Backend #Databases #Developers #Tech #SoftwareDevelopment #FullStackDevelopment
To view or add a comment, sign in
-
Explore related topics
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development