On March 31, 2026, one of the world's most downloaded JavaScript libraries named Axios with (100M+ installs/week) was poisoned, due to a social engineering attack on the primary developer and stealing his account credential to publish the malicious version. Axios versions 1.14.1 and 0.30.4 shipped with a hidden remote access trojan that executed the moment developers ran npm install. For 3 hours, the "latest" tag or version pointed to malware. If you updated axios between 00:21–03:15 UTC window, your system is likely compromised. Here's your reading list: • How a stolen npm token bypassed GitHub Actions entirely • Why detection failed (the obvious red flag no one caught) • The 60-minute remediation checklist that actually works • Why this keeps happening—and how to stop it This isn't just about axios. This is about the structural weakness in how we've built modern software infrastructure. I just published a deep technical breakdown covering: - The account takeover mechanism - How plain-crypto-js evaded detection - Why provenance metadata matters - What changes need to happen at npm - The defense strategies that actually work Read the full analysis: https://lnkd.in/gT85iMWg If you're managing dependencies at scale, or tired of finding out about compromises after they hit production—this one's for you. The packages you trust today could be poisoned tomorrow. The only defense is staying paranoid. #Security #DevOps #JavaScript #SupplyChainSecurity #Cybersecurity
Axios Poisoned by Social Engineering Attack
More Relevant Posts
-
JavaScript devs this one's serious. Please take 2 minutes to read this. Yesterday someone pulled off one of the scariest npm attacks I've seen in a while. axios the HTTP library literally every Node.js project uses got backdoored. The attacker didn't do anything flashy. They just quietly took over the npm account of axios's lead maintainer, changed the email, locked him out, and pushed two malicious versions (1.14.1 and 0.30.4). That's it. No dramatic code injection into axios itself they just slipped in a fake dependency called plain-crypto-js that ran a postinstall script and dropped a Remote Access Trojan on your machine. Mac, Windows, Linux all affected. It was live for about 3 hours. 3 hours on a package with 100M+ weekly downloads. North Korean state-sponsored hackers are being blamed for this one, which honestly explains the level of sophistication double obfuscated dropper, platform-specific payloads, anti-forensic cleanup. This wasn't some script kiddie. If your CI/CD pipeline or dev machine ran npm install anywhere between 00:21 and 03:29 UTC on March 31, you need to act now: Check your lock file first: grep -E '1.14.1|0.30.4' package-lock.json If you're affected, don't just update the package and move on. Assume full breach. Revoke everything API keys, SSH keys, GitHub tokens, cloud credentials. All of it. Check your outbound traffic for any connections to sfrclak[.]com The packages are gone from npm now, but if they ran on your system, the malware already did its job. What frustrates me most about this is how simple the actual attack was. The npm ecosystem trusts maintainer accounts completely and that's the vulnerability. Not the code. The trust. Lock down your machines. Talk to your team. And maybe finally look into tools that verify package integrity before install. Stay safe everyone #JavaScript #NodeJS #CyberSecurity #OpenSource #SupplyChainAttack #axios
To view or add a comment, sign in
-
-
⚠️ Axios was compromised. Here's what every JavaScript developer needs to know. On March 31, 2026, attackers hijacked the npm account of an axios maintainer and pushed two poisoned releases — axios@1.14.1 and axios@0.30.4 — to a library with 100 million weekly downloads. The malicious dependency (plain-crypto-js@4.2.1) installed a Remote Access Trojan silently during npm install, self-destructed after running, and left almost no trace behind. Google's Threat Intelligence Group attributed this to a North Korean state-sponsored group. This was targeted espionage. 🔴 Affected? Treat your system as fully compromised. → Downgrade to axios@1.14.0 or axios@0.30.3 → Rotate all secrets and credentials → Audit CI/CD pipelines for the March 31 UTC window The npm ecosystem's trust model is only as strong as the weakest maintainer credential. Always pin versions. Always use lockfiles. Stay safe out there. 🛡️ #JavaScript #npm #CyberSecurity #SupplyChain #DevSecOps #WebDev #ReactNative
To view or add a comment, sign in
-
-
March 31, 2026 might be the worst day in npm history. Two massive incidents. Same day. Both involving npm. Let me break it down. Incident 1: Axios got hacked. An attacker hijacked the npm account of Axios's lead maintainer, published two poisoned versions (1.14.1 and 0.30.4), and injected a hidden dependency that silently installs a Remote Access Trojan on your machine. Axios has 100+ million weekly downloads. The malicious versions were live for about 3 hours before being taken down. But in that window, any project that ran npm install automatically pulled the malware. No user interaction needed. The scariest part? The malware self-destructs after execution. You check your node_modules folder afterwards and everything looks clean. You'd never know you were compromised. Incident 2: Claude Code's entire source code leaked. Anthropic accidentally shipped a 59.8 MB source map file inside their npm package. A security researcher found it at 4:23 AM. By morning, all 512,000 lines of proprietary TypeScript were on GitHub with thousands of forks. The leak exposed 44 hidden feature flags, unreleased products, internal API logic, and a system called "Undercover Mode" that was literally designed to prevent leaks. The irony writes itself. What every developer needs to do right now: - Check your lockfile for axios@1.14.1 or axios@0.30.4. If found, assume your machine is compromised. - Rotate ALL credentials. API keys, SSH keys, npm tokens, cloud credentials. Everything. - Downgrade to axios@1.14.0 or axios@0.30.3 immediately. - Run npm install with --ignore-scripts as a standard practice going forward. - Pin your dependency versions. Stop using caret ranges (^) for critical packages. This is a wake-up call for the entire JavaScript ecosystem. We trust npm with our entire supply chain, and one compromised account can take down millions of projects in hours. If you're a developer, share this with your team today. Not tomorrow. Today. Have you checked your projects yet? #npm #JavaScript #CyberSecurity #Axios #ClaudeCode #Anthropic #Developers #SoftwareEngineering #SupplyChainAttack #TechNews
To view or add a comment, sign in
-
-
🚨 I’m late to this… but every developer should see this. A recent issue involving axios exposed a serious risk 👇 Not a bug. Not a crash. 👉 A supply chain attack. ⚠️ What actually happened? Attackers compromised the npm ecosystem and published malicious Axios versions (1.14.1, 0.30.4). These versions secretly included a harmful dependency: -plain-crypto-js@4.2.1 (malicious package) -Installed automatically during npm install -Executed hidden scripts This payload could: -Steal sensitive data 🔐 -Execute commands remotely -Install a Remote Access Trojan (RAT) 💥 The scary part? This wasn’t a fake package… 👉 It was published from a compromised official account Meaning even trusted libraries can become attack vectors 🛡️ What you should do -Avoid affected versions: 1.14.1, 0.30.4 -Audit your package-lock.json / yarn.lock -Rotate API keys if exposed -Reinstall dependencies from clean sources -Use security tools (Snyk, npm audit, etc.) 🔗 Reference https://lnkd.in/gCtkpb5w 💡 Final thought This post may be late… But the lesson isn’t. 👉 Don’t just trust packages — verify them. #FullStackDeveloper #FrontendDeveloper #BackendDeveloper #WebDeveloper #JavaScript #TypeScript #NodeJS #ReactJS #Angular #VueJS #SoftwareEngineer #SoftwareDevelopment #Coding #Programming #CyberSecurity #AppSecurity #InfoSec #OWASP #SupplyChainAttack #OpenSource #DevCommunity #TechCommunity #Developers #CloudComputing #DevOps #SystemDesign #TechAwareness
To view or add a comment, sign in
-
🚨 𝗨𝗿𝗴𝗲𝗻𝘁 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗔𝗹𝗲𝗿𝘁 𝗳𝗼𝗿 𝘁𝗵𝗲 𝗪𝗲𝗯 𝗗𝗲𝘃 𝗖𝗼𝗺𝗺𝘂𝗻𝗶𝘁𝘆! 🚨 If you are planning to use 𝗔𝘅𝗶𝗼𝘀 in your upcoming projects—or are currently using it—please pause and double-check your environment. We recently witnessed one of the most critical supply chain attacks in our ecosystem. The npm account of an Axios lead maintainer was hijacked, and malicious versions (𝟭.𝟭𝟰.𝟭 and 𝟬.𝟯𝟬.𝟰) were published. These infected versions silently install a Remote Access Trojan (RAT) that compromises systems and steals sensitive credentials. 𝗠𝘆 𝗮𝗱𝘃𝗶𝗰𝗲 𝗳𝗼𝗿 𝗱𝗲𝘃𝗲𝗹𝗼𝗽𝗲𝗿𝘀 𝗿𝗶𝗴𝗵𝘁 𝗻𝗼𝘄: 🛑 𝗛𝗼𝗹𝗱 𝗼𝗳𝗳: If you are starting a new project, consider avoiding Axios for the time being. Native fetch API or other alternatives are great options right now. 🔍 𝗣𝗶𝗻 𝗬𝗼𝘂𝗿 𝗩𝗲𝗿𝘀𝗶𝗼𝗻𝘀: If you absolutely must use it in an existing codebase, strictly pin your dependencies to known safe versions (like 1.14.0 or 0.30.3). Remove the ^ or ~ prefixes in your package.json to prevent auto-updating to compromised builds. 🧹 𝗔𝘂𝗱𝗶𝘁 & 𝗥𝗼𝘁𝗮𝘁𝗲: Run npm list axios immediately. If you were exposed to the infected versions, assume your environment is compromised and rotate all your API keys, secrets, and passwords. Let's keep our codebases secure. Stay safe, everyone! 💻🛡️ #Axios #WebDevelopment #CyberSecurity #JavaScript #FrontEndDeveloper #TechAlert #NPM
To view or add a comment, sign in
-
-
🚨 THE AXIOS HACK: Your node_modules just became a crime scene. 🕵️♂️🦠 If you use Axios, read this. One of the most trusted libraries (100M+ downloads/week!) was just hit by a sophisticated supply chain attack. 🕵️♂️🦠 As a Senior AI Full-Stack Engineer, I’ve seen my share of vulnerabilities, but this one is a masterclass in deception. Here is exactly what happened and why it's a wake-up call for all of us: The Breach 🔓💀 A lead maintainer’s npm account was hijacked. The attacker didn't touch the Axios source code—they were smarter. They added a "phantom dependency" called plain-crypto-js. The Payload 📡⚡ The moment you ran npm install, a post-install script triggered. Within SECONDS—before the install even finished—it deployed a cross-platform Remote Access Trojan (RAT) targeting Mac, Windows, and Linux. The Stealth 🧹👻 It didn’t just steal keys; it wiped its own tracks, replacing malicious files with "clean" decoys to fool incident responders. It even bypassed GitHub Actions' OIDC protections because it was a manual publish. My Key Takeaways for the Team: 1️⃣ Pin Your Versions: Never trust the caret (^). Lock your versions and audit your package-lock.json for axios@1.14.1 or 0.30.4. 2️⃣ Disable Scripts in CI: Use npm ci --ignore-scripts to stop malicious post-install hooks from firing in your build pipelines. 3️⃣ Trust, but Verify: A "trusted" maintainer is still a human with a password. If a package suddenly adds a weird dependency, RED FLAG. 🚩 We’re treating package updates like a mystery box. It's time to start looking inside. 📦🎰 Are you auditing your lockfiles today, or just hitting "update" and praying? 👇 #SoftwareEngineering #CyberSecurity #Javascript #WebDev #AI #SupplyChainAttack
To view or add a comment, sign in
-
-
One of the biggest JavaScript supply chain scares we’ve ever seen The widely used Axios package — installed over 300 million times per week — was recently compromised in a highly sophisticated attack. Here’s what happened A threat actor hijacked a lead maintainer’s account on npm, changed account details, and published new versions of Axios. Because the releases came from a trusted maintainer, they passed through CI/CD pipelines and went straight into production environments worldwide. Now here’s the truly alarming part: There was no malicious code directly inside Axios itself. Instead, the attacker added a seemingly harmless dependency. But during installation, that dependency executed a post-install script that deployed a remote access trojan (RAT) — potentially giving full system control to the attacker. Let that sink in. Quick math: Axios is installed ~500 times per second. Even if the compromised version was live for just 2 hours… that’s millions of potentially affected systems. This wasn’t random. This was precise, targeted, and executed with deep understanding of how modern software delivery works. Key takeaway: This incident is a stark reminder that trust in open-source ecosystems is fragile — and supply chain security is no longer optional. 1. Audit dependencies regularly 2. Lock versions where possible 3. Monitor package changes and maintainers 4. Treat post-install scripts with extreme caution Thankfully, the issue was identified quickly — but the implications are massive. We’re no longer just securing our code. We’re securing everything our code depends on. #CyberSecurity #OpenSource #JavaScript #SupplyChainSecurity #DevSecOps
To view or add a comment, sign in
-
More from this author
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development
Read the complete analysis here: https://medium.com/@tararoutray/axios-just-poisoned-100m-installations-heres-your-60-minute-response-plan-ed38c6665644