← Back to Blog
🛡️

Axios Library Compromised on NPM: Critical Supply Chain Attack Alert

By techchip2 April 2026
CybersecurityNPMAxiosMalwareSupply Chain AttackRAT

JavaScript developers using the widely popular Axios HTTP client library are facing a critical security threat. On March 30, 2026, two malicious versions of Axios—1.14.1 and 0.30.4—were published to the NPM registry after a primary maintainer's account was compromised.

The Attack Mechanism

The poisoned releases do not directly modify the Axios source code. Instead, they introduce a hidden dependency: plain-crypto-js@4.2.1.

This malicious package executes a postinstall script immediately upon installation. This script acts as a dropper for a cross-platform Remote Access Trojan (RAT), targeting Windows, macOS, and Linux systems. Once active, the Trojan establishes communication with a command-and-control (C2) server (sfrclak.com:8000), allowing attackers to execute arbitrary code and exfiltrate sensitive data.

Advanced Evasion Techniques

This supply chain attack is notable for its operational sophistication:

Recommended Remediation Steps

If you have installed or updated to Axios versions 1.14.1 or 0.30.4, your system must be considered compromised. We recommend the following immediate actions:

  1. Verify Your Versions: Check your package.json and package-lock.json files for the affected versions.
  2. Downgrade Immediately: Revert to a known stable and clean version of Axios (e.g., 1.14.0 or 0.30.3).
  3. Clean Installation: Run npm cache clean --force and perform a fresh install after ensuring the malicious dependency is removed.
  4. Security Audit: Since the malware may have already executed, perform a full system scan for indicators of compromise (IoC) and rotate any sensitive credentials (API keys, passwords) that may have been stored on the affected machines.

Conclusion

Supply chain attacks continue to pose a major risk to the JavaScript ecosystem. We strongly encourage maintainers to adopt NPM's OIDC Trusted Publisher mechanism to prevent credential-based account takeovers.

Stay vigilant and ensure your development environment remains secure. For more cybersecurity updates, stay tuned to TechChip.