🚨 Security Alert: Malicious Package “plaim-crypto-js” & Axios Versions Impact A malicious npm package plaim-crypto-js has been identified leveraging a postinstall script to execute code immediately after installation — a classic supply chain attack. 🔍 Where does Axios come in? Projects using axios (v1.14.1 and v0.30.4) are not inherently vulnerable on their own. However, the risk appears when: These versions are used alongside compromised or untrusted packages (like plaim-crypto-js) Sensitive data (tokens, headers, API keys) is handled insecurely Malicious code intercepts or manipulates outgoing requests ⚠️ Potential attack scenario: Developer installs a malicious package (plaim-crypto-js) postinstall script runs silently Environment variables and secrets are exfiltrated Attacker uses tools like Axios within the project context to: Intercept API calls Modify request headers Redirect data to external endpoints 💣 Why this matters Even trusted libraries like Axios can become part of the attack chain when the environment is compromised. ✅ Action steps for teams using Axios (v1.14.1 / v0.30.4): Audit dependencies for plaim-crypto-js or unknown packages Remove any suspicious libraries immediately Rotate API keys and tokens Monitor outgoing HTTP requests for anomalies Lock dependency versions and review updates carefully 🛡️ Best practices: Use npm install --ignore-scripts in CI/CD pipelines Regularly run npm audit Validate all third-party packages before installing Implement network monitoring/logging for API calls #CyberSecurity #Axios #NodeJS #JavaScript #SupplyChainSecurity #InfoSec #Developers #TechSecurity
SaveMarSoft’s Post
More Relevant Posts
-
One of the most widely used JavaScript libraries in the world just became part of a supply chain attack. Axios, with over 300 million weekly downloads, was recently affected by malicious npm versions that distributed a Remote Access Trojan (RAT). The attack didn’t rely on phishing, exploits, or user mistakes. It used something far more dangerous: normal development workflows. A simple npm install or npm update was enough to pull compromised code into applications. From there, attackers could establish persistence, access sensitive data, and potentially move further into internal environments. This is what makes modern supply chain attacks so effective. They don’t need to break into systems, no, it is more elegant, they are invited in as dependencies. For many organisations, axios is not just another library. It sits deep inside backend services, frontend applications, APIs, and CI/CD pipelines. That means the blast radius of such an incident is not limited to a single system, but can extend across entire development and production environments. The uncomfortable reality is that developers did everything “right”. They used trusted libraries, followed standard processes, and relied on official package managers. And still, the compromise happened. Yeah, sounds scary. This is a strong reminder that: > open-source dependencies are part of your attack surface, > trust in packages is not static, > and software supply chain security is no longer optional. Monitoring dependency integrity, validating package sources, and having visibility into what actually runs in your environments is becoming just as important as traditional security controls. Because today, attackers don’t need to exploit your system, they just need to become part of your codebase. Sources: GitHub issue discussions, StepSecurity analysis, and reporting by The Hacker News. #CyberSecurity #SupplyChainSecurity #OpenSource #npm #JavaScript #DevSecOps #ThreatIntelligence #InfoSec Photo by Lucas Andrade: https://lnkd.in/d9-RbvAR
To view or add a comment, sign in
-
-
🚨 Security Alert: Axios npm Supply Chain Compromise If you are a JavaScript/TypeScript developer, stop what you’re doing and check your local environment. On March 30, the popular axios package was briefly compromised. Malicious versions (1.14.1 and 0.30.4) were published to npm, staying live for about 3.5 hours. If you ran npm install or yarn during that window—especially on personal projects without strict script protections—your machine might be at risk. The Risk: The compromised versions installed a malicious package called plain-crypto-js designed to harvest sensitive data like .env files and credentials. How to Protect Yourself: * Check your cache and node_modules: Look for any traces of plain-crypto-js. * Audit your .npmrc: Ensure you have ignore-scripts=true enabled to prevent malicious post-install scripts from executing automatically. * Rotate Secrets: If you find a match, assume your local environment variables have been compromised and rotate your API keys immediately. #CyberSecurity #SoftwareEngineering #Javascript #NodeJS #AppSec #SupplyChainAttack Use Quick scan script
To view or add a comment, sign in
-
-
🚨 Axios Supply Chain Attack — A Wake-Up Call for Every JavaScript Developer A recent incident involving the widely used Axios npm package shows just how fragile our ecosystem has become. 👉 A trusted library 👉 Millions of weekly downloads 👉 Compromised in hours And that was enough. ⸻ 💣 What happened? Attackers gained access to the official Axios package and published malicious versions: ⚠️ Compromised versions: • axios@1.14.1 • axios@0.30.4 These versions included: • A hidden malicious dependency (plain-crypto-js) • Code executed during install (postinstall) • A cross-platform Remote Access Trojan (RAT) 🧠 How the attack worked 👉 Maintainer account was compromised 👉 Legit-looking versions were published 👉 Malicious dependency injected 👉 Install scripts executed the payload No obvious red flags. No suspicious imports. Just trusted code. ⸻ 🔐 Real risk Once executed, the RAT could: • Steal credentials (tokens, SSH keys, env variables) • Access local files • Potentially allow remote control of the machine CI/CD pipelines were also vulnerable. ⸻ 🛡️ What you should do right now 🚫 Avoid / remove: • axios@1.14.1 • axios@0.30.4 🔍 Check for: • plain-crypto-js in your dependency tree 🔁 Rotate secrets if there’s any risk #javascript #npm #security #cybersecurity #opensource #webdev #supplychain
To view or add a comment, sign in
-
-
🚨 I’m late to this… but every developer should see this. A recent issue involving axios exposed a serious risk 👇 Not a bug. Not a crash. 👉 A supply chain attack. ⚠️ What actually happened? Attackers compromised the npm ecosystem and published malicious Axios versions (1.14.1, 0.30.4). These versions secretly included a harmful dependency: -plain-crypto-js@4.2.1 (malicious package) -Installed automatically during npm install -Executed hidden scripts This payload could: -Steal sensitive data 🔐 -Execute commands remotely -Install a Remote Access Trojan (RAT) 💥 The scary part? This wasn’t a fake package… 👉 It was published from a compromised official account Meaning even trusted libraries can become attack vectors 🛡️ What you should do -Avoid affected versions: 1.14.1, 0.30.4 -Audit your package-lock.json / yarn.lock -Rotate API keys if exposed -Reinstall dependencies from clean sources -Use security tools (Snyk, npm audit, etc.) 🔗 Reference https://lnkd.in/gCtkpb5w 💡 Final thought This post may be late… But the lesson isn’t. 👉 Don’t just trust packages — verify them. #FullStackDeveloper #FrontendDeveloper #BackendDeveloper #WebDeveloper #JavaScript #TypeScript #NodeJS #ReactJS #Angular #VueJS #SoftwareEngineer #SoftwareDevelopment #Coding #Programming #CyberSecurity #AppSecurity #InfoSec #OWASP #SupplyChainAttack #OpenSource #DevCommunity #TechCommunity #Developers #CloudComputing #DevOps #SystemDesign #TechAwareness
To view or add a comment, sign in
-
🚨 Axios Supply Chain Attack – A Wake-Up Call for Developers In the last couple of days, the developer community witnessed yet another supply chain attack, this time involving Axios (or related npm packages). 👉 Important clarification: This was NOT a flaw in Axios itself, but a compromised package version published to npm. --- 🔍 What actually happened? An attacker likely gained access to a maintainer account or npm token and pushed a malicious version of the package. This version potentially: - Exfiltrated environment variables - Leaked API keys, JWT secrets, DB credentials - Sent sensitive data to external servers --- ⚠️ Why this is serious If your project installed the affected version: - Your backend secrets could be exposed - CI/CD pipelines might be compromised - Production systems could be at risk --- 🛡️ Immediate actions you should take ✅ Check installed version of Axios ✅ Reinstall dependencies with a clean lockfile ✅ Rotate ALL secrets (don’t skip this!) ✅ Audit your dependencies ("npm audit") ✅ Monitor unusual outbound traffic --- 💡 Lessons for every developer This incident reinforces a harsh reality: 👉 Your application is only as secure as your dependencies Start adopting: - Exact version pinning (avoid "^" and "~") - Lockfile enforcement ("npm ci") - Dependency scanning tools (Snyk, Dependabot) - Secure handling of npm tokens in CI/CD --- 🧠 Final thought We often focus on writing secure code, but modern attacks are shifting toward what we install, not what we write. Stay alert. Stay updated. Stay secure. 🔐 #CyberSecurity #NodeJS #JavaScript #WebDevelopment #SupplyChainAttack #DevSecOps #SoftwareEngineering
To view or add a comment, sign in
-
🚨 Axios npm Supply Chain Attack: A Critical Wake-Up Call On March 31, 2026, one of the most trusted JavaScript libraries — Axios (100M+ weekly downloads) — became the attack vector in a software supply chain compromise. This wasn’t a vulnerability. This was trusted code turned malicious. ⚠️ What happened: Attackers compromised the maintainer’s npm account Published backdoored versions: • axios@1.14.1 • axios@0.30.4 Injected a malicious dependency: plain-crypto-js Leveraged a postinstall script → auto-execution during npm install 💣 No import. No execution flow. Just installing the package = compromise. 🖥️ Impact: Cross-platform RAT deployed (Windows/macOS/Linux) Data exfiltration: • Cloud credentials (AWS/GCP/Azure) • SSH keys • API tokens • .env secrets • CI/CD credentials 🕵️ Post-execution cleanup removed traces → Making detection and forensics extremely difficult 🧠 Why this attack is dangerous: Exploits trust in widely used open-source packages Executes at install-time (before runtime security controls) Targets developer machines and CI/CD pipelines directly 🛡️ Key security controls: ✅ Lock dependencies (package-lock.json / yarn.lock) ✅ Disable lifecycle scripts in CI (npm ci --ignore-scripts) ✅ Enforce minimum release age for new packages ✅ Use trusted publishing (OIDC-based provenance) ✅ Run builds in isolated environments without long-lived secrets ✅ Implement real-time SCA with malware detection 💡 Reality check: Every npm install is a potential code execution event. If you don’t control what runs during dependency installation, you don’t control your security posture. 🔐 Final takeaway: Software supply chain is now a primary attack surface. Security must shift left — into dependency management, build pipelines, and package trust. #CyberSecurity #SupplyChainSecurity #DevSecOps #npm #JavaScript #CloudSecurity #AppSec #InfoSec
To view or add a comment, sign in
-
🚨𝐀𝐱𝐢𝐨𝐬 𝐒𝐮𝐩𝐩𝐥𝐲-𝐂𝐡𝐚𝐢𝐧 𝐀𝐭𝐭𝐚𝐜𝐤 — 𝐂𝐡𝐞𝐜𝐤 𝐘𝐨𝐮𝐫 𝐕𝐞𝐫𝐬𝐢𝐨𝐧 𝐈𝐦𝐦𝐞𝐝𝐢𝐚𝐭𝐞𝐥𝐲 A recent security incident impacted Axios, one of the most widely used HTTP libraries in the JavaScript ecosystem. Malicious versions were briefly published to npm as part of a supply-chain attack. ⚠️𝐀𝐟𝐟𝐞𝐜𝐭𝐞𝐝 𝐀𝐱𝐢𝐨𝐬 𝐕𝐞𝐫𝐬𝐢𝐨𝐧𝐬: • 1.14.1 • 0.30.4 If you installed any of the above versions, your environment may be compromised. 🔍𝐇𝐨𝐰 𝐭𝐨 𝐜𝐡𝐞𝐜𝐤: 𝘯𝘱𝘮 𝘭𝘴 𝘢𝘹𝘪𝘰𝘴 🛡️ 𝐅𝐢𝐱 𝐢𝐦𝐦𝐞𝐝𝐢𝐚𝐭𝐞𝐥𝐲: 𝘯𝘱𝘮 𝘶𝘯𝘪𝘯𝘴𝘵𝘢𝘭𝘭 𝘢𝘹𝘪𝘰𝘴 𝘯𝘱𝘮 𝘪𝘯𝘴𝘵𝘢𝘭𝘭 𝘢𝘹𝘪𝘰𝘴@𝘭𝘢𝘵𝘦𝘴𝘵 𝐖𝐡𝐚𝐭 𝐈 𝐝𝐢𝐝: • Verified dependency using npm ls axios • Confirmed Axios not installed → Not affected • Ran audit to validate project security 💡 𝐃𝐞𝐯𝐞𝐥𝐨𝐩𝐞𝐫 𝐓𝐚𝐤𝐞𝐚𝐰𝐚𝐲𝐬: • Lock dependency versions • Avoid blind updates • Monitor npm security alerts • Always run 𝘯𝘱𝘮 𝘢𝘶𝘥𝘪𝘵 • Review transitive dependencies 📚 𝐒𝐨𝐮𝐫𝐜𝐞 / 𝐅𝐮𝐫𝐭𝐡𝐞𝐫 𝐑𝐞𝐚𝐝𝐢𝐧𝐠: https://lnkd.in/gP2SaY2z Supply-chain attacks are increasing — even trusted libraries can be targeted. Always verify before installing. 𝐒𝐭𝐚𝐲 𝐬𝐞𝐜𝐮𝐫𝐞, 𝐝𝐞𝐯𝐞𝐥𝐨𝐩𝐞𝐫𝐬. 🔐 #axios #javascript #nodejs #npm #cybersecurity #webdevelopment #opensource #developers #softwareengineering #infosec
To view or add a comment, sign in
-
-
🚨 Axios Supply Chain Attack A Critical Lesson for Developers & Security Teams A major supply chain compromise has impacted one of the most widely used JavaScript libraries, Axios. On March 31, 2026, attackers gained access to a maintainer’s npm account and published malicious versions: axios@1.14.1 axios@0.30.4 These versions included a hidden dependency (plain-crypto-js) that executed a post-install script, deploying a cross-platform Remote Access Trojan (RAT) affecting macOS, Windows, and Linux. According to Snyk, this attack allowed malware to execute simply by running npm install, meaning developers, CI/CD pipelines, and build systems could be compromised without any code changes. (Snyk) This was not a typical vulnerability. The attacker leveraged trust in the ecosystem by injecting a malicious dependency into an official package release. 📌 Official Advisory (CSA Singapore): https://lnkd.in/ghr7FUPn 📌 GitHub Incident Thread: https://lnkd.in/gWHuPPzY 📌 Deep Technical Breakdown (Snyk): https://lnkd.in/gErdDc86 🔍 What you should do Avoid axios@1.14.1 and axios@0.30.4 Audit lockfiles for affected versions Check for plain-crypto-js in dependencies Rotate credentials if exposure is possible Review CI/CD logs for unusual install-time activity Rebuild affected systems from a clean state if needed 🧠 Key takeaway This incident reinforces a critical shift in security: 👉 The biggest risk is no longer just vulnerabilities in code 👉 It is trust in the software supply chain itself Even highly trusted packages can become attack vectors within minutes when distribution channels are compromised. Strong practices like lockfile enforcement, dependency pinning, controlled updates, and monitoring install-time behavior are now essential. #CyberSecurity #SupplyChainSecurity #NodeJS #DevSecOps #Infosec
To view or add a comment, sign in
-
🚨 𝐀𝐱𝐢𝐨𝐬 𝐒𝐮𝐩𝐩𝐥𝐲 𝐂𝐡𝐚𝐢𝐧 𝐀𝐭𝐭𝐚𝐜𝐤 (𝐌𝐚𝐫𝐜𝐡 2026) - 𝐀 𝐖𝐚𝐤𝐞-𝐔𝐩 𝐂𝐚𝐥𝐥 𝐟𝐨𝐫 𝐄𝐯𝐞𝐫𝐲 𝐉𝐚𝐯𝐚𝐒𝐜𝐫𝐢𝐩𝐭 𝐃𝐞𝐯𝐞𝐥𝐨𝐩𝐞𝐫 On March 30-31, 2026, one of the most widely used HTTP libraries in the JavaScript ecosystem - 𝗔𝘅𝗶𝗼𝘀 - became the target of a sophisticated software supply chain attack. This wasn’t just another vulnerability. This was an attack on developer trust. 🔍 What actually happened? An attacker compromised the npm account of a core Axios maintainer and published malicious versions: 👉 axios@1.14.1 👉 axios@0.30.4 These versions were live on npm for ~2-3 hours - enough time to impact thousands of installs globally. ⚠️ what the malicious package did The compromised versions included a hidden dependency: 📦 plain-crypto-js@4.2.1 During installation, a postinstall script (setup.js) executed automatically and: 🛑 Dropped a Remote Access Trojan (RAT) 🔐 Attempted to steal credentials (API keys, tokens, SSH keys) 💻 Enabled remote control of the developer’s machine 🧹 Self-destructed to remove traces and evade detection 👉 Yes — just running npm install could compromise your system. Axios has 100M+ weekly downloads. This means: Thousands of dev machines could have been exposed CI/CD pipelines could have been compromised Production secrets might have been leaked silently 👉 𝗧𝗵𝗶𝘀 𝗶𝘀 𝘁𝗵𝗲 𝗱𝗮𝗿𝗸 𝘀𝗶𝗱𝗲 𝗼𝗳 𝗼𝗽𝗲𝗻-𝘀𝗼𝘂𝗿𝗰𝗲 𝗱𝗲𝗽𝗲𝗻𝗱𝗲𝗻𝗰𝘆 𝘁𝗿𝘂𝘀𝘁 🧠 Key takeaway Your development environment is part of your attack surface. #SupplyChainSecurity #npm #JavaScript #DevSecOps #OpenSourceSecurity #axios #CyberSecurity
To view or add a comment, sign in
-
🚨 Axios Supply Chain Attack: What Happened & How We Are Responding 🚨 Critical Security Update for the Developer Ecosystem A recent supply chain attack targeting the widely used npm package axios has raised serious concerns across the industry. According to Snyk’s security advisory: https://lnkd.in/gSXaQr9K 👉 Two malicious versions of axios (1.14.1 and 0.30.4) were published via a compromised maintainer account. 👉 The attack introduced a hidden dependency that deployed a cross-platform Remote Access Trojan (RAT). 👉 Any system running `npm install` during the exposure window could have been silently compromised. This is not a vulnerability in axios itself. This is a trust-chain compromise. At Soluner Tech, we treat such incidents as systemic signals, not isolated events. 🔍 What we are doing immediately: ✅ Full Dependency Chain Audit Scanning all direct and transitive dependencies across ZentraPulse and internal systems. ✅ Compromise Detection via Runtime Intelligence Using ZentraPulse to detect: - Unexpected outbound connections - Suspicious install-time behavior - Anomalous service interactions ✅ CI/CD Hardening - Enforcing deterministic builds - Blocking unverified dependency resolution - Monitoring install-time scripts ✅ Credential Safety Protocol - Rotating tokens and secrets where exposure risk exists - Auditing pipeline execution logs ✅ Secure Ingestion & SSRF Protection Restricting external call patterns to validated domains only. 📊 Why this matters: Supply chain attacks don’t target your code. They target your dependencies, pipelines, and trust assumptions. The axios incident demonstrates how a single compromised publish can impact: - Developer environments - CI/CD pipelines - Production systems This is exactly the class of problem ZentraPulse is designed to address: 👉 Detect anomalies at runtime 👉 Correlate suspicious behavior across systems 👉 Reduce blind spots in modern SaaS architectures Security today is not just prevention. It is continuous detection and adaptive response. Team Soluner Tech #CyberSecurity #SupplyChainSecurity #DevSecOps #NodeJS #JavaScript #CloudSecurity #ApplicationSecurity #SaaS #TechLeadership #OpenSourceSecurity #ZentraPulse #SolunerTech
To view or add a comment, sign in
Explore related topics
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development