Executive Summary
In March 2026, attackers compromised the npm account of a lead maintainer of Axios, a widely-used JavaScript HTTP client library with over 100 million weekly downloads. They released two malicious versions of the package—axios@1.14.1 and axios@0.30.4—which included a trojan-laden dependency named 'plain-crypto-js'. This rogue package executed a post-installation script that downloaded and installed a cross-platform Remote Access Trojan (RAT) targeting macOS, Windows, and Linux systems. The malware connected to a command-and-control server, deployed system-specific payloads, and erased its tracks to evade detection. The malicious versions were available for approximately two to three hours before being removed from the npm registry. (tomshardware.com)
This incident underscores the escalating threat of supply chain attacks within the open-source ecosystem. The rapid deployment and widespread use of compromised packages highlight the need for enhanced security measures in software development pipelines. Organizations are urged to implement stringent access controls, conduct regular audits of dependencies, and monitor for unusual activity to mitigate the risks associated with such attacks.
Why This Matters Now
The Axios npm supply chain attack exemplifies the growing sophistication of cyber threats targeting open-source software repositories. As these attacks become more prevalent, it is imperative for organizations to fortify their software supply chains, enforce strict security protocols, and remain vigilant against potential compromises to safeguard their systems and data.
Attack Path Analysis
Attackers compromised the npm account of a lead maintainer of the widely-used Axios JavaScript library, injecting malicious code into the package. This code executed a post-installation script that downloaded and installed a cross-platform Remote Access Trojan (RAT) on systems where the compromised package was installed. The RAT established a connection to a command-and-control server, allowing attackers to execute arbitrary commands and exfiltrate sensitive data. The attack was detected and mitigated within a few hours, limiting its impact.
Kill Chain Progression
Initial Compromise
Description
Attackers gained access to the npm account of an Axios maintainer and published malicious versions of the package.
MITRE ATT&CK® Techniques
Compromise Software Dependencies and Development Tools
Compromise Software Supply Chain
Valid Accounts
Credential Dumping: LSASS Memory
Command and Scripting Interpreter: PowerShell
Application Layer Protocol: Web Protocols
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure all system components and software are protected from known vulnerabilities
Control ID: 6.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Supply Chain Risk Management
Control ID: 3.1
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Critical exposure to npm supply chain attacks targeting CI/CD pipelines, wormable malware, and multi-stage threats affecting software development lifecycle and deployment security.
Information Technology/IT
High risk from npm ecosystem vulnerabilities enabling lateral movement, command & control establishment, and data exfiltration through compromised JavaScript packages and dependencies.
Financial Services
Severe impact from supply chain compromises affecting customer-facing applications, requiring enhanced egress security and zero trust segmentation to prevent data breaches.
Health Care / Life Sciences
Significant HIPAA compliance risks from npm-based attacks potentially compromising patient data through vulnerable web applications and healthcare management systems.
Sources
- The npm Threat Landscape: Attack Surface and Mitigationshttps://unit42.paloaltonetworks.com/monitoring-npm-supply-chain-attacks/Verified
- One of JavaScript's most popular libraries compromised by hackers - Axios npm package hit in supply chain attack that deployed a cross-platform RAThttps://www.tomshardware.com/tech-industry/cyber-security/axios-npm-package-compromised-in-supply-chain-attack-that-deployed-a-cross-platform-ratVerified
- Shai-Hulud malware campaign dubbed 'the largest and most dangerous npm supply-chain compromise in history' - 'hundreds' of JavaScript packages affectedhttps://www.tomshardware.com/tech-industry/cyber-security/shai-hulud-malware-campaign-dubbed-the-largest-and-most-dangerous-npm-supply-chain-compromise-in-history-hundreds-of-javascript-packages-affectedVerified
- Thousands of fake packages flood npm registry in major attack - here's what we knowhttps://www.techradar.com/pro/security/thousands-of-fake-packages-flood-npm-registry-in-major-attack-heres-what-we-knowVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have constrained the attacker's ability to move laterally and exfiltrate data by enforcing strict segmentation and controlled egress policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While Aviatrix CNSF may not prevent the initial compromise of the npm account, it could limit the subsequent impact by restricting unauthorized communications from compromised workloads.
Control: Zero Trust Segmentation
Mitigation: Aviatrix Zero Trust Segmentation could likely limit the RAT's ability to escalate privileges by enforcing strict access controls between workloads.
Control: East-West Traffic Security
Mitigation: Aviatrix East-West Traffic Security could likely constrain the attacker's lateral movement by monitoring and controlling internal traffic between workloads.
Control: Multicloud Visibility & Control
Mitigation: Aviatrix Multicloud Visibility & Control could likely detect and restrict unauthorized outbound connections to command-and-control servers.
Control: Egress Security & Policy Enforcement
Mitigation: Aviatrix Egress Security & Policy Enforcement could likely limit data exfiltration by controlling and monitoring outbound data flows.
With Aviatrix CNSF, the attack's impact could likely be further reduced by limiting the attacker's ability to move laterally and exfiltrate data.
Impact at a Glance
Affected Business Functions
- Software Development
- Continuous Integration/Continuous Deployment (CI/CD) Pipelines
- Application Security
Estimated downtime: 3 days
Estimated loss: $50,000
Potential exposure of sensitive credentials, API keys, and access tokens due to compromised npm packages.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict lateral movement within systems.
- • Enforce Egress Security & Policy Enforcement to monitor and control outbound traffic.
- • Utilize Threat Detection & Anomaly Response to identify and respond to malicious activities.
- • Apply Inline IPS (Suricata) to detect and prevent known exploit patterns.
- • Deploy Cloud Native Security Fabric (CNSF) for real-time inspection and enforcement of security policies.



