Changeflow GovPing Banking & Finance Active Supply Chain Attack Targeting Axios NPM
Urgent Notice Added Final

Active Supply Chain Attack Targeting Axios NPM

Favicon for www.cssf.lu CSSF News
Published April 3rd, 2026
Detected April 4th, 2026
Email

Summary

The CSSF issued an urgent advisory on 3 April 2026 regarding a critical supply chain attack targeting two versions of the Axios HTTP client library (1.14.1 and 0.30.4). Threat actors compromised maintainer accounts to inject the malicious dependency plain-crypto-js (version 4.2.1). Supervised entities that performed npm install between 00:21 and 03:25 UTC on March 31, 2026 should assume their systems are compromised. Affected entities must report this major ICT incident under DORA (Circular CSSF 25/893) or Circular CSSF 24/847.

What changed

The CSSF notified supervised entities of an active supply chain compromise affecting Axios NPM versions 1.14.1 and 0.30.4. Threat actors injected the malicious dependency plain-crypto-js (specifically version 4.2.1) through compromised maintainer accounts. Entities that ran npm install during the breach window (00:21-03:25 UTC, March 31, 2026) likely pulled the payload enabling remote code execution, credential theft, and lateral movement.\n\nSupervised entities must immediately: check for Axios usage and isolate affected systems; rotate all credentials (NPM tokens, GitHub tokens, cloud keys, SSH keys, database keys); rebuild from clean state before March 30, 2026; block C2 infrastructure; revert to safe Axios versions; purge NPM cache; and enable MFA. As this constitutes a major ICT-related incident, affected entities must notify the CSSF pursuant to Circular CSSF 25/893 (DORA) or Circular CSSF 24/847. All 16 categories of CSSF-supervised entities are potentially affected.

What to do next

  1. Audit all systems for Axios NPM package usage, checking npm install logs for activity between 00:21-03:25 UTC on March 31, 2026
  2. If compromised versions detected, treat affected systems as fully compromised: isolate immediately, rotate all credentials, and rebuild from clean state prior to March 30, 2026
  3. Submit ICT incident notification to CSSF under Circular CSSF 25/893 (DORA) or Circular CSSF 24/847 as applicable

Source document (simplified)

Published on 3 April 2026 Communiqué

Active supply chain attack targeting Axios NPM

The CSSF has been made aware of a critical supply chain attack targeting two versions of the widely used Axios HTTP client library package. Threat actors compromised maintainer accounts to inject a dependency, plain-crypto-js (specifically version 4.2.1).

As Axios is central to many architectures, a compromise of the build pipeline can result in remote code execution (RCE), credential theft, and lateral movement within the Information System. Users that performed an npm install or updated to the impacted versions of Axios within the compromised window, have likely pulled the malicious payload and should assume their system is compromised.

The CSSF recommends all supervised entities using the Axios package to implement remediation actions including at least the following:

  1. Check if you use the Axios package. If your environment installed the compromised versions of Axios (1.14.1 or 0.30.4) during the breach i.e. if you ran npm install between 00:21 and 03:25 UTC on March 31, 2026, you likely pulled the malicious code. You should treat the affected systems as fully compromised. The malicious dependency isplain-crypto-js (any version, but specifically 4.2.1).
  2. Immediately isolate the affected system.
  3. Rotate all credentials (NPM tokens, GitHub tokens, cloud access keys, SSH keys, database keys, etc.).
  4. Rebuild the system from a known clean (before 30 March 2026).
  5. Block C2 infrastructure.
  6. Revert to a known safe version of Axios.
  7. Purge NPM cache.
  8. Continually monitor for compromise.
  9. Make sure you are hardened for the future e.g. MFA etc. In addition, as this supply chain intrusion involving unauthorised malicious access constitutes a major ICT-related incident, the CSSF reminds all supervised entities that it must be notified. Notifications must be submitted according to either Circular CSSF 25/893 (DORA) or Circular CSSF 24/847, as relevant.

Relevant for

Named provisions

Circular CSSF 25/893 (DORA) Circular CSSF 24/847

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CSSF
Published
April 3rd, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Minor

Who this affects

Applies to
Banks Payment firms Investors
Industry sector
5221 Commercial Banking 5222 Fintech & Digital Payments 5239 Asset Management
Activity scope
ICT Security Incident Response Software Supply Chain Security Credential Management
Threshold
npm install of Axios versions 1.14.1 or 0.30.4 between 00:21 and 03:25 UTC on March 31, 2026
Geographic scope
LU LU

Taxonomy

Primary area
Cybersecurity
Operational domain
Compliance
Compliance frameworks
NIST CSF Dodd-Frank
Topics
Data Privacy Financial Services

Get Banking & Finance alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CSSF News publishes new changes.

Optional. Personalizes your daily digest.

Free. Unsubscribe anytime.