🚨 ALERT FOR EVERY JAVASCRIPT DEVELOPER 🚨 If you use Axios in your Node.js, React, or any JS project — READ THIS NOW. On March 30–31, 2026, a sophisticated hacker compromised the npm account of Axios's primary maintainer and published two backdoored versions: 🔴 axios@1.14.1 🔴 axios@0.30.4 These versions silently install a Remote Access Trojan (RAT) on your machine — Windows, macOS, and Linux all affected — the moment you run: npm install The attack was caught in ~3 hours, but not before thousands of developers may have installed the malicious code. ━━━━━━━━━━━━━━━━━━━━━━ 🕵️ HOW IT WORKED ━━━━━━━━━━━━━━━━━━━━━━ The attacker hijacked jasonsaayman's npm account (Axios lead maintainer), changed the registered email to an anonymous ProtonMail address, and injected a hidden dependency called plain-crypto-js@4.2.1 — a fake package disguised as the real crypto-js. This package runs a postinstall script that: ✅ Drops a RAT (Remote Access Trojan) ✅ Contacts attacker's C2 server in seconds ✅ Then DELETES itself to hide all traces Google's Threat Intelligence team has attributed this to North Korean hackers (tracked as UNC1069). ━━━━━━━━━━━━━━━━━━━━━━ ✅ WHAT YOU MUST DO RIGHT NOW ━━━━━━━━━━━━━━━━━━━━━━ 1️⃣ Check your package-lock.json or yarn.lock for axios@1.14.1 or axios@0.30.4 2️⃣ Downgrade immediately: npm install axios@1.14.0 3️⃣ Delete the malicious folder: rm -rf node_modules/plain-crypto-js 4️⃣ Reinstall with: npm install --ignore-scripts 5️⃣ Rotate ALL credentials on affected systems — npm tokens, SSH keys, cloud keys, CI/CD secrets 6️⃣ Block C2 domain: sfrclak[.]com at your firewall ━━━━━━━━━━━━━━━━━━━━━━ 💡 LESSON FOR EVERY DEVELOPER ━━━━━━━━━━━━━━━━━━━━━━ Supply chain attacks are the new frontier of hacking. The attacker didn't hack your app — they hacked the tool your app trusts. ✔ Always lock your dependency versions (no floating ^ or ~) ✔ Use --ignore-scripts in CI/CD pipelines as a standard practice ✔ Enable npm provenance checks (--provenance flag) ✔ Monitor your dependencies with tools like Snyk or Socket Security Axios has 100 MILLION weekly downloads. This could be one of the largest npm supply chain attacks in history. Stay safe. Share this with your developer network. 🙏 #JavaScript #NodeJS #WebSecurity #npm #SupplyChainAttack #CyberSecurity #Laravel #ReactJS #OpenSource #InfoSec #DeveloperAlert
Node.js Axios Hack Alert: Compromised Versions Installed RAT
More Relevant Posts
-
🚨 Security Alert for JavaScript Developers 🚨 A highly sophisticated attack has surfaced involving a precision-guided Remote Access Trojan (RAT) hidden within Axios — one of the most widely used JavaScript libraries with over 100M+ downloads on npm. But this wasn’t a typical supply chain attack… ⚠️ What makes this attack different? It was surgically targeted, not mass exploitation Malicious code activated only under specific conditions It remained undetected during normal usage and audits Once triggered, it enabled remote access and data exfiltration 📦 Compromised Versions (Reported) Axios v1.14.1 Axios v0.30.4 🚨 If you're using any of these versions, treat it as potentially compromised and take action immediately. 🎯 Why this matters Attackers are shifting from noisy attacks to stealthy, precision-based compromises targeting high-value environments and specific users. 💡 What should you do right now? ✅ Check your version immediately (npm list axios) ✅ Upgrade to the latest secure version ✅ Audit your lock files (package-lock.json, yarn.lock, etc.) ✅ Monitor unusual outbound requests or suspicious behavior ✅ Run security scans (npm audit, Snyk, Dependabot) ✅ Rotate API keys and credentials if exposure is suspected 🧠 Key takeaway Even trusted libraries are no longer “safe by default.” Dependency security is now your responsibility as a developer. If you're working with React, Next.js, or any modern JS stack — this is your wake-up call. Stay alert. Stay secure. 🔐 #JavaScript #WebSecurity #CyberSecurity #SupplyChainAttack #ReactJS #NextJS #Developers #InfoSec
To view or add a comment, sign in
-
The JavaScript world was hit by an attack on one of the biggest libraries in the ecosystem, Axios. It allows developers to make calls to APIs similar to the built-in fetch API that JavaScript comes with. With APIs being such a crucial part of how all modern websites work, the package sees ~100,000,000 downloads per week. The attack vector was something we have seen more and more recently, supply chain attacks. In simple terms what happened was the attacker managed to gain access to an API token that allowed uploading packages to npm, this allowed a malicious version of Axios to be uploaded. The package was then downloaded by users that required the vulnerable version of the package. It then used a post install script to run a remote access trojan on the users computer. And you might say: "I don't use Axios, I am safe" But here is the kicker, you might not be... A crucial concept to understand with npm is that it is a web of dependencies. Over 174,000 packages depend on Axios, if you installed any of those packages, and they relied on the vulnerable version? Your system might have been exploited, and you were none the wiser. Now this is of no fault of your own, after all you have to put a level of trust in tools we use. It is the world that we live in where modern software is developed in this way. That being said I have a few takeaways: - This is one of the most sophisticated attacks of this kind that has been seen, this is far from the end of attacks that will be facilitated via npm, PyPI, or other supply-chains. - Build a strong understanding of transitive dependencies, and what they mean for your project. Be aware that you do not rely on just the packages you install, but also the packages that others use. - Sometimes the right call might be to not install a package. It might make your job easier, but there is always a risk. Is that risk worth it to you? If you want to learn more Elastic has a good, easy to understand writeup: https://lnkd.in/gcvMK6jJ If you think you have been affected, this write up provides steps to check how: https://lnkd.in/gpVSNmxe #CyberSecurity #SupplyChainSecurity #JavaScript #npm #SoftwareSecurity #OpenSource #DevSecOps #AppSec #WebDevelopment #Infosec
To view or add a comment, sign in
-
Axios, the JavaScript library with over 100 million weekly downloads, was compromised on March 31st. For roughly three hours, every fresh install of those two versions silently dropped a remote access trojan on the machine that ran it. Windows, macOS, and Linux, all targeted. The installation completed normally, nothing flagged the change, and the backdoor was already running by the time the command finished. 😏 What happened did not start with a code vulnerability. The attackers went after the lead maintainer of the project directly, reaching out weeks before the attack under the guise of a company founder. They had built a complete fake identity around a real, legitimate company: cloned branding, a Slack workspace with what looked like active channels, fake team members sharing the real company's LinkedIn posts, and fake profiles for other open-source maintainers to make the whole thing look credible During the call, a prompt appeared saying something needed to be updated to continue. This is a technique known as ClickFix, where a fake error or update message is used to get someone to willingly run something malicious themselves. The target just clicks, installs, and hands over full access without realizing it. The maintainer installed what he believed was a missing software component, which turned out to be a remote access trojan that gave the attackers complete control over his machine. Two-factor authentication was enabled, but that does not help once a RAT is running, because software-based 2FA is just another application on the system at that point. Three RAT builds were waiting, one for each platform, all sharing the same command structure, the same C2 protocol, and the same beacon behavior. Depending on the operating system, the malware drops its artifact in a different location: → Windows: %PROGRAMDATA%\wt.exe → macOS: /Library/Caches/com.apple.act.mond → Linux: /tmp/ld.py The malicious packages stayed live for approximately three hours before the npm security team removed them, and during that same window, the attacker was using the compromised account to quietly delete the community reports flagging the attack as it was happening. In the two weeks before Axios was hit, four other widely used developer tools were compromised in rapid succession: a vulnerability scanner, an infrastructure-as-code scanner, an AI proxy library, and a communications library. Quick terminal check: grep -A3 '"axios"' package-lock.json grep 'plain-crypto-js' package-lock.json I cover social engineering in depth in my ethical hacking course, including the psychology behind it, how these attacks are built, and how to recognize them: → https://lnkd.in/e6KECVJc Research & writing: Jolanda de Koff Sharing is fine. Copying without credit is not Read the full breakdown → https://lnkd.in/e5U9cD3P #EthicalHacking #SupplyChain #npm #CyberSecurity #InfoSec
To view or add a comment, sign in
-
-
🚨 If you use Axios in your Node.js projects — read this now. The most downloaded JavaScript library just became a backdoor into your machine. Attackers didn't hack Axios itself. They compromised a maintainer's npm account and slipped in a rogue dependency called plain-crypto-js. Here's what happened silently on install: → Post-install script ran automatically → Detected your OS → Fetched a second-stage payload from a remote server → Installed a Remote Access Trojan (RAT) on your machine → Then deleted itself — leaving zero traces npm audit showed nothing. Your IDE showed nothing. You were owned. Check yourself right now: → Open package.json — are you on a compromised Axios version? → Search node_modules for plain-crypto-js → If found — check immediately if the RAT is active Found it? Deleting the file is NOT enough. Rotate every API key. Every credential. Every token. Now. This is what a modern supply chain attack looks like. Not a phishing email. Not a shady download. Just one npm install. The scariest part? Most developers still think "I'll check tomorrow." Tomorrow is too late. At NodeAscend, security-first development is non-negotiable in everything we ship — AI systems, web apps, all of it. If your team runs Node.js and you're not auditing your dependency tree regularly — let's talk. ♻️ Repost this — one developer in your network needs to see it today. #NodeJS #JavaScript #CyberSecurity #SupplyChainAttack #WebDevelopment #DevSecOps #NodeAscend #OpenSource
To view or add a comment, sign in
-
-
A hijacked maintainer account just poisoned millions of JavaScript projects in under three hours. The recent Axios npm attack demonstrates how fragile our software supply chain truly is. When attackers compromised a single maintainer's account, they managed to inject malware into one of the most trusted JavaScript libraries through hidden dependencies. The scope is staggering – Axios powers countless enterprise applications and developer tools worldwide. This isn't just another security incident; it's a wake-up call for every development team. The attack vector was sophisticated yet simple: compromise the human element, exploit trust relationships, and let automated systems do the rest. Traditional security scanning missed it because the malicious code was buried deep in dependency trees. What's your organization doing to audit third-party dependencies? How are you balancing development velocity with supply chain security? https://lnkd.in/eERCnjM3
To view or add a comment, sign in
-
🚨 Security Alert: The Axios Supply Chain Attack & Your Laravel Apps The Laravel ecosystem is currently navigating one of the most sophisticated supply chain attacks I've seen. A compromised maintainer account led to the release of malicious versions of Axios (specifically 1.14.1 and 0.30.4), which contain a Remote Access Trojan (RAT). Because Axios is a core dependency for so many of our Laravel projects using Vite or Inertia, this isn't just a "JavaScript problem"—it’s a direct threat to your local development environment and your production pipelines. 🛠️ What should you do right now? If you ran npm install or npm update in the last 48 hours, please take these steps immediately: Check your versions: Ensure you aren't running axios@1.14.1 or axios@0.30.4. Roll back and pin: Revert to safe versions: axios@1.14.0 or 0.30.3. Follow Laravel’s Lead: Use the --ignore-scripts flag during installs to prevent malicious postinstall scripts from executing. Rotate Credentials: If you suspect a compromise, treat all tokens, ENV keys, and SSH keys on that machine as leaked. 🛡️ Why "In-House" Matters More Than Ever What strikes me most about this attack is how personal it was. The hackers used high-level social engineering—fake Slack workspaces and cloned identities—to trick a senior maintainer. In a world where security is this volatile, who is writing and managing your code matters. At Jump24, we believe that security and quality start with accountability. We are Laravel developers that click into place because we work as a true extension of your team. Never Outsourced. Never Offshored. Always Exceptional. When the ecosystem faces a crisis, you need a partner who is in the trenches with you, not a faceless ticket system thousands of miles away. We keep your builds clean, your dependencies audited, and your applications resilient. Stay safe out there, artisans. #Laravel #PHP #CyberSecurity #Axios #WebDevelopment #Jump24 #LaravelNew
To view or add a comment, sign in
-
Ever wonder how a single 'npm install' can compromise your entire machine? As a MERN stack developer, I’ve been looking into the recent Axios security breach. The "magic" behind the attack lies in a built-in npm feature: the postinstall script. 𝐖𝐡𝐚𝐭 𝐢𝐬 𝐚 𝐩𝐨𝐬𝐭𝐢𝐧𝐬𝐭𝐚𝐥𝐥 𝐬𝐜𝐫𝐢𝐩𝐭? In npm, 'lifecycle scripts' allow packages to automate tasks. A 'postinstall' script runs automatically as soon as a package (and its dependencies) are finished downloading. It was designed for helpful tasks, like compiling native code. 𝐇𝐨𝐰 𝐝𝐨 𝐡𝐚𝐜𝐤𝐞𝐫𝐬 𝐞𝐱𝐩𝐥𝐨𝐢𝐭 𝐢𝐭? The danger is that these scripts run with the same permissions as the user who typed the command. 𝑯𝒆𝒓𝒆 𝒊𝒔 𝒕𝒉𝒆 𝒕𝒚𝒑𝒊𝒄𝒂𝒍 𝒇𝒍𝒐𝒘 𝒐𝒇 𝒂 𝒅𝒆𝒑𝒆𝒏𝒅𝒆𝒏𝒄𝒚 𝒂𝒕𝒕𝒂𝒄𝒌: ⦿ The "Dropper": The hacker injects a "postinstall": "node setup.js" line into the package.json of a compromised library. ⦿ Silent Execution: When you run 'npm install', your terminal silently executes that setup.js file. You usually won't see any red flags in the console. ⦿ The Payload: That script reaches out to a remote server to download a malicious payload—like a Remote Access Trojan (RAT)—specifically designed for your Operating System. ⦿ The Cleanup: Modern attacks (like the recent Axios one) are sophisticated enough to delete the malicious script and the evidence from your node_modules immediately after running, making 'npm audit' believe everything is fine. 𝐇𝐨𝐰 𝐭𝐨 𝐩𝐫𝐨𝐭𝐞𝐜𝐭 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟: ➊ Use --ignore-scripts: When installing a new or untrusted package, run 'npm install --ignore-scripts'. This prevents any lifecycle scripts from executing. ➋ Audit your CI/CD: Ensure your build servers are isolated and don't have unnecessary access to sensitive environment variables during the install phase. ➌ Move to Native: Where possible, use native APIs like 'fetch' to reduce the number of third-party dependencies in your graph. Security is a shared responsibility. Every dependency you add is a door you're leaving unlocked—make sure you know who has the key. #WebDevelopment #CyberSecurity #NodeJS #NPM #SoftwareEngineering #Programming #MERNStack #TechSecurity
To view or add a comment, sign in
-
🚨 This Axios Incident Changed How I Look at Dependencies 🚨 This recent incident really made me rethink how I handle dependencies. - A compromised npm account - Malicious Axios versions published - A hidden dependency installing a Remote Access Trojan (RAT) All triggered by a simple: npm install Key realization: Even trusted libraries can become attack vectors overnight. This attack could expose: - API keys - AWS credentials - Sensitive data What I’m changing: - Reviewing dependencies more carefully - Locking versions strictly - Avoiding unnecessary packages - Staying cautious with postinstall scripts Axios itself isn’t the problem — the ecosystem risk is. Security is no longer optional — it’s part of development. https://lnkd.in/gFBV4amB #JavaScript #CyberSecurity #NodeJS #NPM #Developers #DevOps
To view or add a comment, sign in
-
🚨 Axios NPM Package Compromised: Supply Chain Attack Hits JavaScript HTTP Client with 100M+ Weekly Downloads 🔍 What actually happened (fact-checked) Published malicious versions: axios@1.14.1 axios@0.30.4 Injected a fake dependency: plain-crypto-js This dependency executed a postinstall script → installed a cross-platform RAT 👉 Impact: Affects macOS, Windows, Linux Installs malware silently during npm install Can lead to credential theft & remote control 👉 Exposure window: ~ 2–3 hours, but enough to infect CI/CD pipelines globally 👉 Scale: Axios = ~100M weekly downloads Used across backend, frontend, infra pipelines 🧠 Why this is serious It bypassed GitHub code review / CI pipelines Malware was delivered via trusted dependency chain Developers didn’t need to click anything — just install 👉 This is a textbook software supply chain attack (same class as SolarWinds / Log4j) 🛡️ Official mitigation guidance (from Microsoft & security teams) Avoid: 1.14.1 0.30.4 Use safe versions: 1.14.0 or earlier Rotate: API keys, tokens, credentials Audit: CI/CD logs during attack window Treat affected systems as fully compromised 📚 Official / Verified Sources: • Microsoft Security Blog: https://lnkd.in/gWCucvDk • Google Threat Intelligence: https://lnkd.in/gq6YG8_X • StepSecurity Analysis: https://lnkd.in/g7J5PbDn • Tom’s Hardware Coverage: https://lnkd.in/gyFqYrTA #CyberSecurity #SupplyChainSecurity #DevSecOps #JavaScript #NPM #EngineeringLeadership
To view or add a comment, sign in
More from this author
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development