Attackers compromised the Axios maintainer's NPM account to publish malicious dependancies deploying remote access malware. Learn how to detect and mitigate supply chain risk.


Compromised versions of axios (1.14.1 and 0.30.4 ), a widely used JavaScript package were published to NPM. The affected versions inject the malicious dependancy plain-crypto-js@4.2.1 . This deployed a cross-platform remote access trojan (RAT) which allows attackers to remotely execute code on affected Windows, MacOS, and Linux devices and take full control of the system.
This should be a more detailed description of the threat, it should include:
axios maintainer was hijacked and the malicious packages we’re pushed directly to npm outside of the usual release process.axios@1.14.1 and axios@0.30.4. npm has since removed both.node-modules will not reveal whether you were infected, only checking log files will.qqbrowser/openclaw-qbot@0.0.130 .This threat affects any organisation who installed axios@1.14.1 , axios@0.30.4 after 23:59 UTC on March 30th before the takedown or any organisation that installed plain-crypto-js@4.2.1 after 04:00 UTC on March 30th before the takedown.
It is important to understand the extend to which your supply chain is affected by this threat as it affects a widely used JavaScript package, which has the ability to completely takeover any Windows, MacOS, or Linux system on which is executes. This could lead to lateral movements and subsequent breaches between organisation and across your supply chain ecosystem.
“This is an evolving situation. You can keep up to date with the latest information on this threat by reading the following:
https://socket.dev/blog/axios-npm-package-compromised
Socket identified the malicious package initially and are monitoring it’s subsequent spread through the software supply chain.
To understand how your supply chain is affected by the axios NPM package compromise, create your free account on Risk Ledger. You can find out more about how the Emerging Threats feature on Risk Ledger works here.
Monthly research, case studies and practical guides you won't find anywhere else.
Join thousands of security managers turning their TPRM programmes into success stories.