Changeflow GovPing Data Privacy & Cybersecurity Critical Axios Supply Chain Compromise via npm
Urgent Guidance Added Final

Critical Axios Supply Chain Compromise via npm

Favicon for www.csa.gov.sg CSA Alerts & Advisories (Singapore)
Published April 1st, 2026
Detected April 1st, 2026
Email

Summary

CSA issued an advisory on a critical supply chain compromise affecting Axios JavaScript HTTP client versions 1.14.1 and 0.30.4. Threat actors compromised a maintainer's npm account to inject a Remote Access Trojan (RAT) targeting Windows, macOS, and Linux systems. Affected organizations should immediately downgrade to safe versions (axios@1.14.0 or 0.30.3) and remove the malicious plain-crypto-js@4.2.1 package.

What changed

CSA Singapore identified a critical supply chain compromise where threat actors compromised the npm account of an Axios maintainer to publish malicious versions of the HTTP client library. The attack injected a malicious dependency (plain-crypto-js@4.2.1) into axios@1.14.1 and @0.30.4, deploying a RAT across Windows, macOS, and Linux. C2 communications route through sfrclak[.]com (IP 142.11.206.73). File artifacts include %PROGRAMDATA%\wt.exe on Windows and /tmp/ld.py on Linux.

Affected organizations must immediately downgrade Axios to versions 1.14.0 or 0.30.3, remove plain-crypto-js from all environments, rotate all credentials (API keys, tokens, SSH keys, environment secrets), and conduct threat hunting using the provided IoCs. Review CI/CD logs for suspicious outbound connections and installation-time anomalies. No formal compliance deadline is specified for this advisory.

What to do next

  1. Downgrade Axios to safe versions: 1.14.0 or 0.30.3
  2. Remove malicious package plain-crypto-js@4.2.1 from all environments and node_modules
  3. Rotate all credentials including API keys, access tokens, SSH keys, and environment secrets
  4. Scan systems for listed IoCs and review CI/CD logs for suspicious activity

Source document (simplified)

Advisory

Advisory on Axios Supply Chain Attack via Compromised npm Account

1 April 2026

A critical software supply chain compromise has been identified affecting the widely used JavaScript HTTP client Axios. Organisations using affected versions of the product are advised to assess their systems and networks for potential compromise.

Background

A critical software supply chain compromise has been identified affecting the widely used JavaScript HTTP client Axios. Threat actors successfully compromised the npm account of a primary Axios maintainer and published unauthorised malicious package versions to the npm registry, resulting in a global supply chain attack affecting Axios users worldwide.

The affected releases contain a malicious dependency designed to execute a post-install payload, resulting in the deployment of a Remote Access Trojan (RAT) across multiple operating systems, including Windows, macOS, and Linux. The attack demonstrates a high level of sophistication, involving credential compromise, Continuous Integration and Continuous Deployment (CI/CD) pipeline bypass, dependency injection, and anti-forensics techniques.

Affected Product Versions:

Source: https://socket.dev/blog/axios-npm-package-compromised

  • Compromise of npm maintainer account credentials

  • Unauthorised publication of malicious package versions

  • Injection of a malicious dependency into production releases

  • Execution of malicious code during package installation via post-install scripts
    Indicators of Compromise (IoCs)

Malicious npm Packages

  • axios@1.14.1 — shasum: 2553649f232204966871cea80a5d0d6adc700ca
  • axios@0.30.4 — shasum: d6f3f62fd3b9f5432f5782b62d8cfd5247d5ee71
  • plain-crypto-js@4.2.1 — shasum: 07d889e2dadce6f3910dcbc253317d28ca61c766
    Network Indicators

  • C2 domain: sfrclak[.]com

  • C2 IP: 142[.]11[.]206[.]73

  • C2 URL: http[:]//sfrclak[.]com:8000/6202033
    Unique POST body identifiers used by the malware for OS fingerprinting:

  • C2 POST body (macOS): packages.npm.org/product0

  • C2 POST body (Windows): packages.npm.org/product1

  • C2 POST body (Linux): packages.npm.org/product2
    File System Indicators

  • macOS:

    • /Library/Caches/com[.]apple[.]act[.]mond
  • Windows:

    • Persistent:
    • %PROGRAMDATA%\wt.exe
    • system.bat (persistence script)
      • SHA256: f7d335205b8d7b20208fb3ef93ee6dc817905dc3ae0c10a0b164f4e7d07121cd
    • Temporary (self-deletes):
    • %TEMP%\6202033.vbs
    • %TEMP%\6202033.ps1
    • Linux:
    • /tmp/ld[.]py Recommended Actions

Organisations are recommended to adopt the following measures to protect against supply chain attacks:

Named provisions

Background Affected Product Versions Overview of the Attack Indicators of Compromise (IoCs) Recommended Actions

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CSA
Published
April 1st, 2026
Instrument
Guidance
Legal weight
Non-binding
Stage
Final
Change scope
Minor
Document ID
AD-2026-002

Who this affects

Applies to
Technology companies Government agencies Employers
Industry sector
5112 Software & Technology 9211 Government & Public Administration
Activity scope
Software Supply Chain Security npm Package Distribution CI/CD Pipeline Security
Geographic scope
Singapore SG

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF NIST 800-53
Topics
Data Privacy Software Supply Chain Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CSA Alerts & Advisories (Singapore) publishes new changes.

Optional. Personalizes your daily digest.

Free. Unsubscribe anytime.