Local Tech Repair: Axios Breach: Supply Chain Attack Delivers Cross-Platform RAT to Millions of Developers

Pages

Tuesday, March 31, 2026

Axios Breach: Supply Chain Attack Delivers Cross-Platform RAT to Millions of Developers

A sophisticated supply chain attack targeting the widely used Axios npm package has introduced a cross-platform Remote Access Trojan (RAT) affecting Windows, macOS, and Linux systems.



Malicious versions 1.14.1 and 0.30.4 were published using a compromised maintainer account, injecting a hidden dependency designed solely to execute a post-install malware dropper.

Developers are urged to immediately downgrade, remove affected dependencies, and rotate credentials if exposure is suspected.

A Trusted Library Turned Threat Vector


In one of the most impactful npm ecosystem attacks of 2026, threat actors successfully compromised the supply chain of Axios—a library with over 80 million weekly downloads across modern web applications.

Rather than modifying Axios directly, attackers took a more evasive route: injecting a malicious dependency named plain-crypto-js@4.2.1 into two newly published versions.

This dependency was never meant to be used in code. Its sole purpose was to execute a hidden postinstall script, silently deploying malware during package installation.

How the Attack Worked


image from TheHackerNews.com
The compromise began with the takeover of an npm maintainer account, allowing attackers to bypass CI/CD safeguards and publish malicious releases.
  • Compromised npm account used to publish malicious Axios versions
  • Injected dependency: plain-crypto-js@4.2.1
  • Malware triggered automatically via npm postinstall hook
  • No malicious code present in Axios source itself

This technique made detection extremely difficult, as traditional code reviews showed no suspicious changes in Axios.

Cross-Platform RAT Deployment


Once executed, the malicious installer deployed a sophisticated cross-platform Remote Access Trojan (RAT) tailored to the host operating system.

Attack Flow Overview

Image Attribution: Conceptual supply chain attack flow diagrams. Source: Various security research reports. Adapted from public analyses.


  • macOS: Downloads and executes a C++ RAT via AppleScript from a remote server
  • Windows: Uses PowerShell and VBScript to deploy a persistent RAT disguised as system binaries
  • Linux: Executes a Python-based RAT via shell commands running in the background

Each variant communicates with the same command-and-control (C2) infrastructure, using tailored payload delivery mechanisms per platform.

Stealth and Evasion Techniques


The attackers demonstrated a high level of operational maturity, implementing multiple anti-forensics techniques:
  • Self-deleting malware after execution
  • Replacement of package.json to remove evidence
  • Use of a clean decoy manifest (package.md)
  • No persistence on macOS/Linux (suggesting rapid data exfiltration)
  • Registry-based persistence on Windows systems

Notably, the malware maintained a 60-second beacon loop, enabling continuous command execution and system monitoring.

Timeline of the Attack


The operation was carefully staged and executed within hours:
  • March 30, 2026: Clean dependency version (4.2.0) published
  • March 30, 2026 (later): Malicious version (4.2.1) released
  • March 31, 2026: Axios versions 1.14.1 and 0.30.4 published with injected dependency
  • Within ~39 minutes: Both release branches compromised

Security researchers emphasized that this was a highly coordinated attack, not opportunistic in nature.

Indicators of Compromise (IOCs)


Developers and security teams should immediately check for the following artifacts:
  • macOS: /Library/Caches/com.apple.act.mond
  • Windows: %PROGRAMDATA%\wt.exe
  • Linux: /tmp/ld.py

Additionally, any presence of plain-crypto-js@4.2.1 should be treated as a strong indicator of compromise.

Response and Mitigation


If your environment may be affected, take immediate action:
  • Downgrade Axios to 1.14.0 or 0.30.3
  • Remove plain-crypto-js from dependencies
  • Rotate all credentials and secrets
  • Audit CI/CD pipelines for exposure
  • Block outbound traffic to the malicious C2 domain

Organizations should assume full system compromise if RAT artifacts are detected.

Why This Attack Matters


This incident highlights a dangerous evolution in supply chain attacks:
  • Abuse of trusted ecosystems like npm
  • Malware hidden in transitive dependencies
  • Execution triggered automatically during install
  • Cross-platform targeting at scale

Most importantly, it reinforces a critical lesson:

Even the most trusted dependencies can become attack vectors overnight.

Final Thoughts


The Axios supply chain attack is a stark reminder that modern software development pipelines are only as secure as their weakest dependency.

With attackers increasingly targeting package registries and CI/CD workflows, organizations must adopt stricter controls, including dependency auditing, runtime monitoring, and zero-trust principles within development environments.

As supply chain threats continue to evolve, vigilance—not trust—must become the default.

Additional Information & Further Reading




No comments:

Post a Comment