Critical Axios Supply Chain Compromise via npm
Summary
CSA issued an advisory on a critical supply chain compromise affecting Axios JavaScript HTTP client versions 1.14.1 and 0.30.4. Threat actors compromised a maintainer's npm account to inject a Remote Access Trojan (RAT) targeting Windows, macOS, and Linux systems. Affected organizations should immediately downgrade to safe versions (axios@1.14.0 or 0.30.3) and remove the malicious plain-crypto-js@4.2.1 package.
What changed
CSA Singapore identified a critical supply chain compromise where threat actors compromised the npm account of an Axios maintainer to publish malicious versions of the HTTP client library. The attack injected a malicious dependency (plain-crypto-js@4.2.1) into axios@1.14.1 and @0.30.4, deploying a RAT across Windows, macOS, and Linux. C2 communications route through sfrclak[.]com (IP 142.11.206.73). File artifacts include %PROGRAMDATA%\wt.exe on Windows and /tmp/ld.py on Linux.
Affected organizations must immediately downgrade Axios to versions 1.14.0 or 0.30.3, remove plain-crypto-js from all environments, rotate all credentials (API keys, tokens, SSH keys, environment secrets), and conduct threat hunting using the provided IoCs. Review CI/CD logs for suspicious outbound connections and installation-time anomalies. No formal compliance deadline is specified for this advisory.
What to do next
- Downgrade Axios to safe versions: 1.14.0 or 0.30.3
- Remove malicious package plain-crypto-js@4.2.1 from all environments and node_modules
- Rotate all credentials including API keys, access tokens, SSH keys, and environment secrets
- Scan systems for listed IoCs and review CI/CD logs for suspicious activity
Source document (simplified)
Advisory
Advisory on Axios Supply Chain Attack via Compromised npm Account
1 April 2026
A critical software supply chain compromise has been identified affecting the widely used JavaScript HTTP client Axios. Organisations using affected versions of the product are advised to assess their systems and networks for potential compromise.
Background
A critical software supply chain compromise has been identified affecting the widely used JavaScript HTTP client Axios. Threat actors successfully compromised the npm account of a primary Axios maintainer and published unauthorised malicious package versions to the npm registry, resulting in a global supply chain attack affecting Axios users worldwide.
The affected releases contain a malicious dependency designed to execute a post-install payload, resulting in the deployment of a Remote Access Trojan (RAT) across multiple operating systems, including Windows, macOS, and Linux. The attack demonstrates a high level of sophistication, involving credential compromise, Continuous Integration and Continuous Deployment (CI/CD) pipeline bypass, dependency injection, and anti-forensics techniques.
Affected Product Versions:
- axios@1.14.1
- axios@0.30.4 Overview of the attack
Source: https://socket.dev/blog/axios-npm-package-compromised
Compromise of npm maintainer account credentials
Unauthorised publication of malicious package versions
Injection of a malicious dependency into production releases
Execution of malicious code during package installation via post-install scripts
Indicators of Compromise (IoCs)
Malicious npm Packages
- axios@1.14.1 — shasum: 2553649f232204966871cea80a5d0d6adc700ca
- axios@0.30.4 — shasum: d6f3f62fd3b9f5432f5782b62d8cfd5247d5ee71
plain-crypto-js@4.2.1 — shasum: 07d889e2dadce6f3910dcbc253317d28ca61c766
Network IndicatorsC2 domain: sfrclak[.]com
C2 IP: 142[.]11[.]206[.]73
C2 URL: http[:]//sfrclak[.]com:8000/6202033
Unique POST body identifiers used by the malware for OS fingerprinting:C2 POST body (macOS): packages.npm.org/product0
C2 POST body (Windows): packages.npm.org/product1
C2 POST body (Linux): packages.npm.org/product2
File System IndicatorsmacOS:
- /Library/Caches/com[.]apple[.]act[.]mond
Windows:
- Persistent:
- %PROGRAMDATA%\wt.exe
- system.bat (persistence script)
- SHA256: f7d335205b8d7b20208fb3ef93ee6dc817905dc3ae0c10a0b164f4e7d07121cd
- Temporary (self-deletes):
- %TEMP%\6202033.vbs
- %TEMP%\6202033.ps1
- Linux:
- /tmp/ld[.]py Recommended Actions
Organisations are recommended to adopt the following measures to protect against supply chain attacks:
Remove and remediate affected versions:
- Downgrade to safe versions: axios@1.14.0 or 0.30.3
Eliminate malicious artifacts: Remove plain-crypto-js from all environments and node_modules
Verify that no unauthorised files or scripts remain on affected systems
Assume potential compromise: rotate all credentials, including:
- API keys
- Access tokens
- SSH keys
- Environment secrets
Perform threat hunting and detection:
- Scan systems for listed IoCs
- Review CI/CD logs for:
- Unexpected outbound network connections
- Suspicious installation-time activity References
https://www.elastic.co/security-labs/axios-supply-chain-compromise-detections
https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html
Back to top
Named provisions
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CSA Alerts & Advisories (Singapore) publishes new changes.