JavaScript devs this one's serious. Please take 2 minutes to read this. Yesterday someone pulled off one of the scariest npm attacks I've seen in a while. axios the HTTP library literally every Node.js project uses got backdoored. The attacker didn't do anything flashy. They just quietly took over the npm account of axios's lead maintainer, changed the email, locked him out, and pushed two malicious versions (1.14.1 and 0.30.4). That's it. No dramatic code injection into axios itself they just slipped in a fake dependency called plain-crypto-js that ran a postinstall script and dropped a Remote Access Trojan on your machine. Mac, Windows, Linux all affected. It was live for about 3 hours. 3 hours on a package with 100M+ weekly downloads. North Korean state-sponsored hackers are being blamed for this one, which honestly explains the level of sophistication double obfuscated dropper, platform-specific payloads, anti-forensic cleanup. This wasn't some script kiddie. If your CI/CD pipeline or dev machine ran npm install anywhere between 00:21 and 03:29 UTC on March 31, you need to act now: Check your lock file first: grep -E '1.14.1|0.30.4' package-lock.json If you're affected, don't just update the package and move on. Assume full breach. Revoke everything API keys, SSH keys, GitHub tokens, cloud credentials. All of it. Check your outbound traffic for any connections to sfrclak[.]com The packages are gone from npm now, but if they ran on your system, the malware already did its job. What frustrates me most about this is how simple the actual attack was. The npm ecosystem trusts maintainer accounts completely and that's the vulnerability. Not the code. The trust. Lock down your machines. Talk to your team. And maybe finally look into tools that verify package integrity before install. Stay safe everyone #JavaScript #NodeJS #CyberSecurity #OpenSource #SupplyChainAttack #axios
axios npm backdoor attack: Node.js developers take action
More Relevant Posts
-
🚨 Security Alert : Axios npm package compromise If you're a JavaScript developer, this is something you should NOT ignore. Yesterday, a supply chain attack was discovered in the popular axios npm package. Malicious versions were published using a compromised maintainer account, and they can potentially install a Remote Access Trojan (RAT) on your system. ⚠️ Affected versions: • axios@1.14.1 • axios@0.30.4 These versions include a hidden malicious dependency, which means even a simple npm i axios could put your system at risk. 🛑 Action items: • Do NOT install or upgrade axios blindly • Stick to safe versions (e.g. 1.14.0 or earlier) • Audit your current projects for affected versions • If already installed, assume compromise: – Reinstall dependencies – Run a full system/security audit – Rotate all credentials (passwords, API keys, tokens) This is a reminder that even widely trusted packages are not immune to supply chain attacks. Stay cautious. Always verify before upgrading dependencies. 🔗 Sources: https://lnkd.in/gvwbsyqj https://lnkd.in/gYamcE5M #AxiosAttack #Security #JavaScript #NodeJS #OpenSource #CyberSecurity #Developers #Tech #React #ReactNative
To view or add a comment, sign in
-
-
Axios didn't just have a bug. It had a serious trust issue. Let's be real: when a package with over 100 million weekly downloads gets hacked, saying "we'll patch it later" isn't a plan. It's asking for trouble. The recent Axios mess was a huge red flag for the whole JavaScript world. Attackers took over the npm account, pushed out malicious versions, and turned this super-popular HTTP client into a way to spread malware. With 174,000+ projects using it, that's not some small glitch, it's a massive problem that hits everyone. This wasn't out of nowhere, either. Axios already had security warnings for stuff like SSRF and DoS attacks in various versions. Sure, fixes get released, but the real headache is what happens when you can't fully trust a key dependency anymore. Developers need an easier way to move on without tearing apart their code. That's why I created axios-fixed. It's a tougher, safer version on npm that fixes the vulnerabilities I targeted, and switching to it is dead simple, no big refactor needed. Here's how: Link : https://lnkd.in/dEyZDQjB Install it: npm install axios-fixed Swap the import: From: import axios from 'axios' To: import axios from 'axios-fixed' That's it. Minimal hassle, quick switch, and way better security. I built this because dev teams shouldn't pick between speed and safety. Open source powers the web, but trust is non-negotiable now. Time to level up our tools. #JavaScript #NodeJS #OpenSource #CyberSecurity #NPM #WebDevelopment #SupplyChainSecurity #Axios #Developers
To view or add a comment, sign in
-
-
**🔒 The Axios Supply Chain Attack — A Wake-Up Call for Every Developer** On March 31, 2026, Axios — with 83M+ weekly downloads — was compromised in a supply chain attack. Here's what happened: 1. An attacker stole the maintainer's npm access token 2. Published a clean-looking package called `plain-crypto-js` 3. Pushed two poisoned Axios versions (1.14.1 and 0.30.4) that added it as a dependency 4. npm's `postinstall` script silently installed a Remote Access Trojan (RAT) on macOS, Windows, and Linux The scary part? **Not a single line of Axios source code was changed.** Just one extra dependency in `package.json`. And after deploying the RAT, the malware cleaned up after itself — your `node_modules` looked completely normal. The RAT phoned home every 60 seconds and could run shell commands, list files, exfiltrate data, and load additional malware. Elastic Security Labs linked the macOS payload to a **North Korean threat actor** (UNC1069). **What you should do RIGHT NOW:** → Check if you're on axios 1.14.1 or 0.30.4 — downgrade immediately → Remove `plain-crypto-js` from node_modules → Check for RAT artifacts on your machine → If affected: rotate ALL secrets, tokens, and API keys **Lessons learned:** ✅ Pin your dependency versions — don't blindly auto-upgrade ✅ Use lockfiles and review changes to them ✅ Disable postinstall scripts (`npm install --ignore-scripts`) ✅ Use tools like Socket, Snyk, or npm audit ✅ Enable 2FA on your npm account Supply chain attacks don't target your code. They target your trust. Stay vigilant. 📖 For a detailed step-by-step breakdown, check out my full blog post: https://lnkd.in/gmpiGQUv #CyberSecurity #JavaScript #npm #SupplyChainAttack #Axios #InfoSec #DevSecOps #SoftwareSecurity
To view or add a comment, sign in
-
A major reminder for every developer today: Axios, one of the most widely used JavaScript HTTP clients, was compromised through a supply-chain attack. This was not a vulnerability in Axios code itself. The issue came from a hijacked maintainer npm account, which published malicious versions of the package. The affected releases were axios@1.14.1 and axios@0.30.4. Researchers found that these versions introduced a hidden dependency called plain-crypto-js, which triggered malware during installation through npm lifecycle scripts. That means a normal npm install could silently pull in malicious code. Why this matters: Even trusted open-source packages can become dangerous when the publishing account is compromised. In this case, the attack was designed to hit developers, CI/CD pipelines, and build systems that install the latest package versions automatically. The clean rollback versions are axios@1.14.0 for the 1.x line and axios@0.30.3 for the 0.x line. What should teams do right now? Check lockfiles, dependency trees, and build logs for the affected versions. If either compromised version was installed, treat the machine or pipeline as potentially exposed and rotate secrets, tokens, and credentials. This is a strong reminder that security is not only about writing safe code. It is also about protecting the supply chain, locking versions, reviewing dependency updates, and trusting packages carefully. Elastic Security Labs has the deepest technical breakdown of what happened, including the compromised maintainer account, the malicious dependency, and how the payload behaved across macOS, Windows, and Linux. Read more about it: https://lnkd.in/dgZAdag8 #CyberSecurity #SupplyChainSecurity #Axios #npm #JavaScript #NodeJS #DevSecOps #AppSec #OpenSourceSecurity #SoftwareSecurity #ReactJs #FullStackDeveloper #APIIntergration
To view or add a comment, sign in
-
-
🚨 Axios Supply Chain Attack — A Wake-Up Call for Every JavaScript Developer A recent incident involving the widely used Axios npm package shows just how fragile our ecosystem has become. 👉 A trusted library 👉 Millions of weekly downloads 👉 Compromised in hours And that was enough. ⸻ 💣 What happened? Attackers gained access to the official Axios package and published malicious versions: ⚠️ Compromised versions: • axios@1.14.1 • axios@0.30.4 These versions included: • A hidden malicious dependency (plain-crypto-js) • Code executed during install (postinstall) • A cross-platform Remote Access Trojan (RAT) 🧠 How the attack worked 👉 Maintainer account was compromised 👉 Legit-looking versions were published 👉 Malicious dependency injected 👉 Install scripts executed the payload No obvious red flags. No suspicious imports. Just trusted code. ⸻ 🔐 Real risk Once executed, the RAT could: • Steal credentials (tokens, SSH keys, env variables) • Access local files • Potentially allow remote control of the machine CI/CD pipelines were also vulnerable. ⸻ 🛡️ What you should do right now 🚫 Avoid / remove: • axios@1.14.1 • axios@0.30.4 🔍 Check for: • plain-crypto-js in your dependency tree 🔁 Rotate secrets if there’s any risk #javascript #npm #security #cybersecurity #opensource #webdev #supplychain
To view or add a comment, sign in
-
-
Headline: 🚨 Critical Alert: The Axios Supply Chain Attack (March 31, 2026) If you are a JavaScript/TypeScript developer, stop what you are doing and check your package-lock.json. Yesterday, one of the most downloaded libraries in the world—Axios (100M+ weekly downloads)—was the victim of a major supply chain compromise. Attributed to the North Korean-nexus group UNC1069, this attack bypasses standard code reviews using a "phantom dependency" technique. 🔴 What happened? A lead maintainer’s npm account was compromised. The attackers published two malicious versions: - axios@1.14.1 (Latest) - axios@0.30.4 (Legacy) These versions look identical to the original code, but they include a new "phantom" dependency called plain-crypto-js. ⚙️ How it works: 1. Silent Execution: When you run npm install, the postinstall script in the malicious dependency automatically triggers. 2. Cross-Platform Malware: It drops a Remote Access Trojan (RAT) tailored for your OS (Windows, macOS, or Linux). 3. Anti-Forensics: The malware is designed to delete its own installation scripts and replace the package.json with a "clean" stub version immediately after infection to hide its tracks from developers. 🛡️ How to resolve and audit: 1. Search your Lockfile: Don't just look in package.json. Search your package-lock.json or yarn.lock for plain-crypto-js or the specific Axios versions above. 2. Check your tree: Run npm ls plain-crypto-js. If it shows up, your environment is likely compromised. 3. Rollback & Pin: Revert to axios@1.14.0 or axios@0.30.3. Avoid using ^ or latest tags for now. 4. Assume Breach: If you found the malicious package, rotate all environment secrets (.env keys, AWS tokens, etc.) and treat that machine as "hot." The npm team has removed the versions, but the window of exposure was roughly 3 hours—enough time to infect thousands of CI/CD pipelines. Stay safe and audit your dependencies today! #CyberSecurity #NodeJS #Javascript #WebDev #AppSec #SupplyChainAttack #Axios
To view or add a comment, sign in
-
-
The 𝗮𝘅𝗶𝗼𝘀 𝗻𝗽𝗺 𝗽𝗮𝗰𝗸𝗮𝗴𝗲 was hit by a 𝘀𝘂𝗽𝗽𝗹𝘆 𝗰𝗵𝗮𝗶𝗻 𝗮𝘁𝘁𝗮𝗰𝗸 on March 31, 2026, and if you are a JavaScript developer, this one hits close to home. Axios has roughly 100 million weekly downloads. It is in almost every React, Node.js, or full-stack project out there. Two versions of it (1.14.1 and 0.30.4) were weaponized within a 3-hour window. Here is what happened: Attackers compromised the npm account of 𝗷𝗮𝘀𝗼𝗻𝘀𝗮𝗮𝘆𝗺𝗮𝗻, the primary axios maintainer, and changed the registered email to an attacker-controlled ProtonMail address. Using that access, they published two poisoned releases that injected a hidden dependency: 𝗽𝗹𝗮𝗶𝗻-𝗰𝗿𝘆𝗽𝘁𝗼-𝗷𝘀@𝟰.𝟮.𝟭, a fake lookalike of the legitimate crypto-js library. That package executed a postinstall script the moment you ran npm install, silently dropping a cross-platform 𝗥𝗲𝗺𝗼𝘁𝗲 𝗔𝗰𝗰𝗲𝘀𝘀 𝗧𝗿𝗼𝗷𝗮𝗻 (𝗥𝗔𝗧) targeting Windows, macOS, and Linux. The malware then contacted a C2 server (sfrclak.com:8000), harvesting SSH keys, cloud tokens, API keys, and environment secrets, then self-deleted to wipe its own traces. How was it caught? Three security firms independently identified this attack: - 𝗦𝗼𝗰𝗸𝗲𝘁.𝗱𝗲𝘃: Their automated scanner flagged the malicious plain-crypto-js within 6 minutes of publication (00:05 UTC) - 𝗦𝘁𝗲𝗽𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆: Their AI Package Analyst and Harden-Runner detected anomalous outbound connections during live CI runs, including in the widely used Backstage repository - 𝗦𝗻𝘆𝗸: Published a full technical breakdown of the attack chain and blast radius The malicious versions were live for roughly 3 hours (00:21 to 03:29 UTC) before npm pulled them. What makes this particularly alarming: The attack was pre-staged 18 hours in advance. Three platform-specific RAT payloads were pre-built. Both the 1.x and 0.x release branches were hit within 39 minutes of each other. The malware cleaned up after itself, so npm audit shows nothing. This was not opportunistic. If you use axios, act now: - Pin to version 1.14.0 or 0.30.3 (confirmed safe) - Use npm ci instead of npm install in CI/CD pipelines - Rotate any secrets from environments where the affected versions ran - Add plain-crypto-js to your dependency blocklist This is a reminder that open-source trust is one of our industry's largest attack surfaces. Lockfiles, postinstall script auditing, and runtime monitoring are not optional. They are baseline hygiene.
To view or add a comment, sign in
-
-
🚨 Axios Supply Chain Attack A Critical Lesson for Developers & Security Teams A major supply chain compromise has impacted one of the most widely used JavaScript libraries, Axios. On March 31, 2026, attackers gained access to a maintainer’s npm account and published malicious versions: axios@1.14.1 axios@0.30.4 These versions included a hidden dependency (plain-crypto-js) that executed a post-install script, deploying a cross-platform Remote Access Trojan (RAT) affecting macOS, Windows, and Linux. According to Snyk, this attack allowed malware to execute simply by running npm install, meaning developers, CI/CD pipelines, and build systems could be compromised without any code changes. (Snyk) This was not a typical vulnerability. The attacker leveraged trust in the ecosystem by injecting a malicious dependency into an official package release. 📌 Official Advisory (CSA Singapore): https://lnkd.in/ghr7FUPn 📌 GitHub Incident Thread: https://lnkd.in/gWHuPPzY 📌 Deep Technical Breakdown (Snyk): https://lnkd.in/gErdDc86 🔍 What you should do Avoid axios@1.14.1 and axios@0.30.4 Audit lockfiles for affected versions Check for plain-crypto-js in dependencies Rotate credentials if exposure is possible Review CI/CD logs for unusual install-time activity Rebuild affected systems from a clean state if needed 🧠 Key takeaway This incident reinforces a critical shift in security: 👉 The biggest risk is no longer just vulnerabilities in code 👉 It is trust in the software supply chain itself Even highly trusted packages can become attack vectors within minutes when distribution channels are compromised. Strong practices like lockfile enforcement, dependency pinning, controlled updates, and monitoring install-time behavior are now essential. #CyberSecurity #SupplyChainSecurity #NodeJS #DevSecOps #Infosec
To view or add a comment, sign in
-
On March 31, 2026, one of the world's most downloaded JavaScript libraries named Axios with (100M+ installs/week) was poisoned, due to a social engineering attack on the primary developer and stealing his account credential to publish the malicious version. Axios versions 1.14.1 and 0.30.4 shipped with a hidden remote access trojan that executed the moment developers ran npm install. For 3 hours, the "latest" tag or version pointed to malware. If you updated axios between 00:21–03:15 UTC window, your system is likely compromised. Here's your reading list: • How a stolen npm token bypassed GitHub Actions entirely • Why detection failed (the obvious red flag no one caught) • The 60-minute remediation checklist that actually works • Why this keeps happening—and how to stop it This isn't just about axios. This is about the structural weakness in how we've built modern software infrastructure. I just published a deep technical breakdown covering: - The account takeover mechanism - How plain-crypto-js evaded detection - Why provenance metadata matters - What changes need to happen at npm - The defense strategies that actually work Read the full analysis: https://lnkd.in/gT85iMWg If you're managing dependencies at scale, or tired of finding out about compromises after they hit production—this one's for you. The packages you trust today could be poisoned tomorrow. The only defense is staying paranoid. #Security #DevOps #JavaScript #SupplyChainSecurity #Cybersecurity
To view or add a comment, sign in
-
-
The official Axios package was just compromised. If you are a Node.js, frontend, or backend developer and have run "npm install" within the last 24 hours, you need to audit your project right now. Usually, when we hear about "Axios attacks," it’s just someone typosquatting (like axois). But this time, it was a direct supply-chain attack on the official npm registry. A lead maintainer’s account was hijacked, and two malicious versions were published. Compromised Versions: 1.14.1 and 0.30.4 These versions include a hidden Remote Access Trojan (RAT) designed to steal sensitive data from your system, including .env files, SSH keys, and AWS/database credentials. Immediate Steps to Protect Your Backend: 1- Check your lockfile (package-lock.json or yarn.lock): Open it and search for those two version numbers: 1.14.1 or 0.30.4. 2- If you have them: Your environment is compromised. You must manually delete node_modules, revert your lockfile, and most importantly, ROTATE every single API key, secret, and credential on that machine. 3- Pin your version: In your package.json, remove the caret (^) or tilde (~) from your axios version. Set it to exactly "axios": "1.14.0". This prevents npm from "helpfully" updating you to the compromised 1.14.1 version. This is a massive security event for the JavaScript ecosystem. Spread the word and help protect our community's projects! #SoftwareEngineering #WebSecurity #BackendDeveloper #TechNews #OpenSource #NodeJS #CyberSecurity #WebDevelopment #Backend #Programming
To view or add a comment, sign in
-
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development