The JavaScript world was hit by an attack on one of the biggest libraries in the ecosystem, Axios. It allows developers to make calls to APIs similar to the built-in fetch API that JavaScript comes with. With APIs being such a crucial part of how all modern websites work, the package sees ~100,000,000 downloads per week. The attack vector was something we have seen more and more recently, supply chain attacks. In simple terms what happened was the attacker managed to gain access to an API token that allowed uploading packages to npm, this allowed a malicious version of Axios to be uploaded. The package was then downloaded by users that required the vulnerable version of the package. It then used a post install script to run a remote access trojan on the users computer. And you might say: "I don't use Axios, I am safe" But here is the kicker, you might not be... A crucial concept to understand with npm is that it is a web of dependencies. Over 174,000 packages depend on Axios, if you installed any of those packages, and they relied on the vulnerable version? Your system might have been exploited, and you were none the wiser. Now this is of no fault of your own, after all you have to put a level of trust in tools we use. It is the world that we live in where modern software is developed in this way. That being said I have a few takeaways: - This is one of the most sophisticated attacks of this kind that has been seen, this is far from the end of attacks that will be facilitated via npm, PyPI, or other supply-chains. - Build a strong understanding of transitive dependencies, and what they mean for your project. Be aware that you do not rely on just the packages you install, but also the packages that others use. - Sometimes the right call might be to not install a package. It might make your job easier, but there is always a risk. Is that risk worth it to you? If you want to learn more Elastic has a good, easy to understand writeup: https://lnkd.in/gcvMK6jJ If you think you have been affected, this write up provides steps to check how: https://lnkd.in/gpVSNmxe #CyberSecurity #SupplyChainSecurity #JavaScript #npm #SoftwareSecurity #OpenSource #DevSecOps #AppSec #WebDevelopment #Infosec
Axios Supply Chain Attack Exposes Millions of Developers
More Relevant Posts
-
🚨 Security Alert for JavaScript Developers 🚨 A highly sophisticated attack has surfaced involving a precision-guided Remote Access Trojan (RAT) hidden within Axios — one of the most widely used JavaScript libraries with over 100M+ downloads on npm. But this wasn’t a typical supply chain attack… ⚠️ What makes this attack different? It was surgically targeted, not mass exploitation Malicious code activated only under specific conditions It remained undetected during normal usage and audits Once triggered, it enabled remote access and data exfiltration 📦 Compromised Versions (Reported) Axios v1.14.1 Axios v0.30.4 🚨 If you're using any of these versions, treat it as potentially compromised and take action immediately. 🎯 Why this matters Attackers are shifting from noisy attacks to stealthy, precision-based compromises targeting high-value environments and specific users. 💡 What should you do right now? ✅ Check your version immediately (npm list axios) ✅ Upgrade to the latest secure version ✅ Audit your lock files (package-lock.json, yarn.lock, etc.) ✅ Monitor unusual outbound requests or suspicious behavior ✅ Run security scans (npm audit, Snyk, Dependabot) ✅ Rotate API keys and credentials if exposure is suspected 🧠 Key takeaway Even trusted libraries are no longer “safe by default.” Dependency security is now your responsibility as a developer. If you're working with React, Next.js, or any modern JS stack — this is your wake-up call. Stay alert. Stay secure. 🔐 #JavaScript #WebSecurity #CyberSecurity #SupplyChainAttack #ReactJS #NextJS #Developers #InfoSec
To view or add a comment, sign in
-
Ever wonder how a single 'npm install' can compromise your entire machine? As a MERN stack developer, I’ve been looking into the recent Axios security breach. The "magic" behind the attack lies in a built-in npm feature: the postinstall script. 𝐖𝐡𝐚𝐭 𝐢𝐬 𝐚 𝐩𝐨𝐬𝐭𝐢𝐧𝐬𝐭𝐚𝐥𝐥 𝐬𝐜𝐫𝐢𝐩𝐭? In npm, 'lifecycle scripts' allow packages to automate tasks. A 'postinstall' script runs automatically as soon as a package (and its dependencies) are finished downloading. It was designed for helpful tasks, like compiling native code. 𝐇𝐨𝐰 𝐝𝐨 𝐡𝐚𝐜𝐤𝐞𝐫𝐬 𝐞𝐱𝐩𝐥𝐨𝐢𝐭 𝐢𝐭? The danger is that these scripts run with the same permissions as the user who typed the command. 𝑯𝒆𝒓𝒆 𝒊𝒔 𝒕𝒉𝒆 𝒕𝒚𝒑𝒊𝒄𝒂𝒍 𝒇𝒍𝒐𝒘 𝒐𝒇 𝒂 𝒅𝒆𝒑𝒆𝒏𝒅𝒆𝒏𝒄𝒚 𝒂𝒕𝒕𝒂𝒄𝒌: ⦿ The "Dropper": The hacker injects a "postinstall": "node setup.js" line into the package.json of a compromised library. ⦿ Silent Execution: When you run 'npm install', your terminal silently executes that setup.js file. You usually won't see any red flags in the console. ⦿ The Payload: That script reaches out to a remote server to download a malicious payload—like a Remote Access Trojan (RAT)—specifically designed for your Operating System. ⦿ The Cleanup: Modern attacks (like the recent Axios one) are sophisticated enough to delete the malicious script and the evidence from your node_modules immediately after running, making 'npm audit' believe everything is fine. 𝐇𝐨𝐰 𝐭𝐨 𝐩𝐫𝐨𝐭𝐞𝐜𝐭 𝐲𝐨𝐮𝐫𝐬𝐞𝐥𝐟: ➊ Use --ignore-scripts: When installing a new or untrusted package, run 'npm install --ignore-scripts'. This prevents any lifecycle scripts from executing. ➋ Audit your CI/CD: Ensure your build servers are isolated and don't have unnecessary access to sensitive environment variables during the install phase. ➌ Move to Native: Where possible, use native APIs like 'fetch' to reduce the number of third-party dependencies in your graph. Security is a shared responsibility. Every dependency you add is a door you're leaving unlocked—make sure you know who has the key. #WebDevelopment #CyberSecurity #NodeJS #NPM #SoftwareEngineering #Programming #MERNStack #TechSecurity
To view or add a comment, sign in
-
🚨 A quick developer security update… Today I came across the news about the Axios npm package supply-chain attack, and honestly it was a strong reminder of how much trust we place in third-party packages. For anyone using Axios in React / Node.js projects, this is something worth paying attention to. A compromised maintainer account reportedly pushed malicious versions: ⚠️ "axios@1.14.1" ⚠️ "axios@0.30.4" The scary part is this wasn’t just a normal bug. A malicious dependency was injected that could run malware during "npm install", potentially exposing tokens, environment variables, and even giving remote access to the machine. As someone currently building full-stack MERN projects, this really made me think about dependency security, package lock files, and version pinning. Big learning from this: Never blindly update packages Always check release notes Lock versions in production Rotate secrets if a compromised package was installed Open-source makes us move fast, but security awareness matters just as much as shipping features. Curious how do you usually verify package updates before installing them? 👇 #JavaScript #NodeJS #ReactJS #CyberSecurity #WebDevelopment #MERNStack #BuildInPublic
To view or add a comment, sign in
-
-
Day 53🔥🚀 Today I focused on finding bugs through JavaScript files. JS files can reveal a lot if you read them carefully. What you might find API endpoints Hidden routes Hardcoded keys (sometimes) Tokens or configuration details Logic that shows how the app works Instead of just interacting with the UI, I started looking at how the application is built behind the scenes.That’s where things get interesting. I also learned about services like SendGrid and how API keys can sometimes be exposed in JS files. But finding a key is not enough, it’s important to handle such discoveries responsibly and validate them only within proper scope. JavaScript is not just code. It’s a map of the application. #Cybersecurity #BugBounty #JavaScript #WebSecurity #Recon #AppSec #Day53 #Consistency
To view or add a comment, sign in
-
🚨 ALERT FOR EVERY JAVASCRIPT DEVELOPER 🚨 If you use Axios in your Node.js, React, or any JS project — READ THIS NOW. On March 30–31, 2026, a sophisticated hacker compromised the npm account of Axios's primary maintainer and published two backdoored versions: 🔴 axios@1.14.1 🔴 axios@0.30.4 These versions silently install a Remote Access Trojan (RAT) on your machine — Windows, macOS, and Linux all affected — the moment you run: npm install The attack was caught in ~3 hours, but not before thousands of developers may have installed the malicious code. ━━━━━━━━━━━━━━━━━━━━━━ 🕵️ HOW IT WORKED ━━━━━━━━━━━━━━━━━━━━━━ The attacker hijacked jasonsaayman's npm account (Axios lead maintainer), changed the registered email to an anonymous ProtonMail address, and injected a hidden dependency called plain-crypto-js@4.2.1 — a fake package disguised as the real crypto-js. This package runs a postinstall script that: ✅ Drops a RAT (Remote Access Trojan) ✅ Contacts attacker's C2 server in seconds ✅ Then DELETES itself to hide all traces Google's Threat Intelligence team has attributed this to North Korean hackers (tracked as UNC1069). ━━━━━━━━━━━━━━━━━━━━━━ ✅ WHAT YOU MUST DO RIGHT NOW ━━━━━━━━━━━━━━━━━━━━━━ 1️⃣ Check your package-lock.json or yarn.lock for axios@1.14.1 or axios@0.30.4 2️⃣ Downgrade immediately: npm install axios@1.14.0 3️⃣ Delete the malicious folder: rm -rf node_modules/plain-crypto-js 4️⃣ Reinstall with: npm install --ignore-scripts 5️⃣ Rotate ALL credentials on affected systems — npm tokens, SSH keys, cloud keys, CI/CD secrets 6️⃣ Block C2 domain: sfrclak[.]com at your firewall ━━━━━━━━━━━━━━━━━━━━━━ 💡 LESSON FOR EVERY DEVELOPER ━━━━━━━━━━━━━━━━━━━━━━ Supply chain attacks are the new frontier of hacking. The attacker didn't hack your app — they hacked the tool your app trusts. ✔ Always lock your dependency versions (no floating ^ or ~) ✔ Use --ignore-scripts in CI/CD pipelines as a standard practice ✔ Enable npm provenance checks (--provenance flag) ✔ Monitor your dependencies with tools like Snyk or Socket Security Axios has 100 MILLION weekly downloads. This could be one of the largest npm supply chain attacks in history. Stay safe. Share this with your developer network. 🙏 #JavaScript #NodeJS #WebSecurity #npm #SupplyChainAttack #CyberSecurity #Laravel #ReactJS #OpenSource #InfoSec #DeveloperAlert
To view or add a comment, sign in
-
-
🚨 A Wake-Up Call for the JavaScript Ecosystem 🚨 The widely trusted HTTP client 𝗔𝘅𝗶𝗼𝘀 (with over 1B weekly downloads) was recently at the center of a serious supply chain security incident. Here’s what happened: • The maintainer’s account was compromised • Malicious versions were published (e.g., 1.14.1 and 0.30.4) • One of those versions reportedly crossed 𝟭𝟬𝗠+ 𝗱𝗼𝘄𝗻𝗹𝗼𝗮𝗱𝘀 before being caught • A fake dependency "𝗽𝗹𝗮𝗶𝗻-𝗰𝗿𝘆𝗽𝘁𝗼-𝗷𝘀" was introduced • It executed a 𝗽𝗼𝘀𝘁𝗶𝗻𝘀𝘁𝗮𝗹𝗹 script, injecting malicious code into systems • Then quietly removed itself to avoid detection This is especially dangerous because many projects use version ranges like `^1.13.6`, which allow automatic upgrades to minor versions — meaning a simple `npm install` could pull in compromised code without any warning. 💡 𝗞𝗲𝘆 𝗧𝗮𝗸𝗲𝗮𝘄𝗮𝘆𝘀: • Lock critical dependencies to exact versions (no `^` or `~`) • Always review dependency changes before upgrading • Treat postinstall scripts as a potential attack surface • Use lockfiles and security auditing tools • Don’t blindly trust even the most popular packages This incident is a reminder: Open source is powerful, but it runs on trust — and trust can be exploited. Stay safe, audit your dependencies, and think twice before auto-updating. #CyberSecurity #JavaScript #OpenSource #SupplyChainAttack #NodeJS #WebDevelopment #InfoSec
To view or add a comment, sign in
-
🚀 Excited to share that my open-source package Laravel GuardDog has been featured in the community links on Laravel News! Laravel GuardDog is a security scanner and vulnerability checker for Laravel applications that helps developers quickly detect common security issues before deploying their projects. 🔍 What Laravel GuardDog checks: • Debug mode enabled in production • Exposed environment variables • Insecure configuration settings • Potential security misconfigurations • Basic vulnerability risks in Laravel apps The goal of this package is to make Laravel application security checks simple, automated, and developer-friendly before going to production. 💡 If you think there are more security checks or features that should be added, feel free to suggest them. Contributions and ideas are always welcome! ⭐ Check it out on GitHub and share your feedback. https://lnkd.in/dqN8uGh3 #Laravel #LaravelPHP #PHP #OpenSource #WebSecurity #CyberSecurity #DevTools #SoftwareDevelopment #GitHub #LaravelCommunity #Programming Laravel News
To view or add a comment, sign in
-
🚨 Heads up to all developers working with JavaScript / Node.js A serious supply chain attack just hit the npm ecosystem — targeting the widely used library Axios. Malicious versions were briefly published after a maintainer account was compromised. These versions injected a hidden dependency that executes during installation and can install a Remote Access Trojan (RAT) on your machine. ⚠️ Affected versions: axios@1.14.1 axios@0.30.4 This isn’t just a bug — it’s a security breach. 👉 If you’ve recently installed or updated Axios: Check your version immediately Remove node_modules and reinstall from a clean state Rotate ALL credentials (API keys, tokens, env variables) Inspect your dependencies for anything suspicious This is a reminder that: Even the most trusted packages can become attack vectors overnight. Stay sharp. Security is no longer optional — it’s part of being a professional developer. #cybersecurity #javascript #nodejs #webdevelopment #devops #opensource
To view or add a comment, sign in
-
-
A hijacked maintainer account just poisoned millions of JavaScript projects in under three hours. The recent Axios npm attack demonstrates how fragile our software supply chain truly is. When attackers compromised a single maintainer's account, they managed to inject malware into one of the most trusted JavaScript libraries through hidden dependencies. The scope is staggering – Axios powers countless enterprise applications and developer tools worldwide. This isn't just another security incident; it's a wake-up call for every development team. The attack vector was sophisticated yet simple: compromise the human element, exploit trust relationships, and let automated systems do the rest. Traditional security scanning missed it because the malicious code was buried deep in dependency trees. What's your organization doing to audit third-party dependencies? How are you balancing development velocity with supply chain security? https://lnkd.in/eERCnjM3
To view or add a comment, sign in
-
Two new Composer vulnerabilities mean a malicious open-source dependency can run arbitrary commands on your build server — even without Perforce installed. Supply chain security isn't a SBOM checkbox. It's auditing every dependency tool in your CI/CD pipeline. Update Composer to 2.9.6 now. A compromised or malicious Composer dependency could execute arbitrary commands on build servers and developer workstations across millions of PHP-based applications — making this a supply chain risk equivalent to npm package poisoning in the PHP ecosystem. #cybersecurity #supplychain #vulnerability #patchnow #PHP
To view or add a comment, sign in
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development