Axios npm Package Hit by Supply Chain Attack: Hidden Trojan Threatens Thousands of Projects

March 31, 2026
Axios npm Package Hit by Supply Chain Attack: Hidden Trojan Threatens Thousands of Projects
  • A supply chain attack on the Axios npm package led to two malicious releases, 1.14.1 and 0.30.4, which hid a dependency called plain-crypto-js that executes a postinstall payload to install a remote access trojan.

  • Indicators of compromise include a cleanup-focused dropper, a malicious domain sfrclak[.]com, an IP address 142.11.206.73, and multiple ephemeral files across macOS, Linux, and Windows paths.

  • Immediate mitigations include downgrading to safe Axios versions, scanning for RAT artifacts, rebuilding from clean states, rotating credentials, and blocking the C2 domain and IPs at the network edge.

  • While exact victim counts weren’t disclosed, industry monitoring and incident responders urge caution and thorough remediation.

  • The broader context shows rising supply chain attacks across ecosystems, reinforcing the need for ongoing key rotation, credential hygiene, and robust network controls to prevent similar incidents.

  • The report situates this within open-source software risk, including state-backed pressures and policy debates about securing OSS in government contexts.

  • Security firms highlighted coordinated activity and provided analyses and IoCs to guide responses.

  • Industry reaction calls for immediate dependency verification and stronger supply chain defenses given the quiet, traceless nature of the compromise and its potential wide impact.

  • Proactive security hygiene is advised, including threat removal guidance from Malwarebytes and general best practices for preventing future infections.

  • Experts view the incident as a significant escalation in supply chain attack tradecraft, likening it to past campaigns and stressing ongoing risk in modern development environments.

  • There is concern about long-term access and potential cryptocurrency theft across thousands of US companies, with a multi-month assessment and response effort anticipated.

  • The primary worry is the blast radius: once a compromised dependency is deployed, it can affect multiple projects and environments beyond the initial infection.

Summary based on 29 sources


Get a daily email with more Tech stories

More Stories