7 min read
By: RedLegg's Cyber Threat Intelligence Team
About:
A supply chain attack targeted the widely used axios npm package by compromising the maintainer account and publishing malicious versions directly to the npm registry.
The attacker introduced a hidden dependency, plain-crypto-js@4.2.1, which executed automatically via a postinstall script during npm installation. This behavior required no user interaction beyond running npm install, making the attack highly effective across developer environments, CI/CD pipelines, and production systems.
The malicious payload deployed a cross-platform Remote Access Trojan affecting Windows, macOS, and Linux systems. It established communication with attacker-controlled infrastructure, executed additional payloads, and harvested sensitive data including SSH keys, cloud credentials, environment variables, and CI/CD secrets.
RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.
VULNERABILITIES
Supply Chain Compromise in Axios npm Package
PoC or Exploitation:
This is an actively exploited supply chain attack. Malicious versions of axios were published to npm and automatically executed a payload during installation. Exploitation required no user interaction beyond running npm install, making it highly effective across developer environments, CI/CD pipelines, and production systems.
Update/ Patch:
- axios 1.14.1
- axios 0.30.4
- axios 1.14.0 and earlier (1.x branch)
- axios 0.30.3 and earlier (0.x branch)
Mitigation Recommendation: