axios npm Supply Chain Attack: Update Your Builds Immediately

🚨 URGENT: Axios npm Supply Chain Attack (March 31, 2026) 🚨 If you’re a developer or DevOps engineer, check your builds immediately. The axios package—one of the most downloaded libraries in the JavaScript ecosystem—was compromised yesterday through a maintainer account hijack. The Details: Hackers bypassed GitHub CI/CD and published malicious versions directly to the npm registry. These versions included a hidden dependency (plain-crypto-js) that installs a Remote Access Trojan (RAT) upon npm install. Affected Versions: ❌ axios@1.14.1 ❌ axios@0.30.4 What to do right now: Audit your lockfiles: Search package-lock.json or yarn.lock for the versions listed above or any mention of plain-crypto-js. Clean & Reinstall: If you find them, delete your node_modules and lockfile, and reinstall using a known safe version (like 1.14.0). Rotate Credentials: If your CI/CD or local machine ran an install during the 3-hour window yesterday, treat your environment as compromised. Rotate your API keys, cloud secrets, and SSH keys immediately. This is a stark reminder that even the most trusted packages are targets. Stay safe and double-check those dependencies! #WebDevelopment #CyberSecurity #Javascript #NodeJS #Coding #InfoSec #Axios

To view or add a comment, sign in

Explore content categories