Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Deploy Modular RAT for Credential Theft With Screenshot
May 8, 2026
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Home/Threats/Axios npm Compromise: Targeted Social Engineering Attack
Threats

Axios npm Compromise: Targeted Social Engineering Attack

On March 31, 2026, two malicious versions of Axios, a widely used JavaScript HTTP library, were briefly published to the npm registry. Each version carried a hidden dependency that installed a remote...

Emy Elsamnoudy
Emy Elsamnoudy
April 3, 2026 3 Min Read
4 0

On March 31, 2026, two malicious versions of Axios, a widely used JavaScript HTTP library, were briefly published to the npm registry.

Each version carried a hidden dependency that installed a remote access trojan (RAT) across macOS, Windows, and Linux systems. The attack did not exploit a flaw in the Axios code itself.

Instead, it targeted something far harder to defend — the trust placed in the hands of the developer who maintains it. What followed exposed just how fragile the human layer of the open source supply chain can truly be.

The attacker executed a carefully planned social engineering campaign against Axios lead maintainer Jason Saayman. They posed as a representative of a legitimate, well-known company and made contact under the pretense of a business collaboration.

To build believability, the attacker created a cloned company identity, set up a convincing Slack workspace, and arranged several staged meetings.

Once Saayman’s trust was earned, the attacker convinced him to install something on his machine that gave them full remote access.

From there, they lifted active browser sessions and stole cookies, quietly hijacking his npm and GitHub credentials without setting off any security alarms.

Researchers at Socket.dev identified the malicious packages shortly after they went live on npm and conducted a thorough analysis of the attack’s full scope.

They found that the damage extended well beyond direct Axios users. Because of how npm handles transitive dependencies, thousands of downstream packages that silently pull in Axios were also exposed.

The reach of the attack was significantly wider than it first appeared, making it one of the more understated but broadly damaging supply chain incidents in recent memory. 

What made this especially difficult to prevent was that even strong security controls — including two-factor authentication and OIDC-based publishing — would not have stopped it.

The attacker was working directly from within Saayman’s compromised machine, using his own active sessions. From npm’s perspective, every action looked completely legitimate.

Saayman later confirmed that the attacker’s access would have been “complete irrespective of what was setup,” because no publishing pipeline is built to detect a legitimate maintainer acting maliciously from their own device.

Axios is one of the most downloaded packages in the entire JavaScript ecosystem, quietly powering HTTP requests across production apps, build systems, CLI tools, and infrastructure layers.

Most teams never made a conscious choice to use it — it arrived through other dependencies, layers deep. Yet this globally critical project is maintained by a very small number of individuals, operating without institutional security resources or any dedicated support. That difficult reality became impossible to ignore.

When the Maintainer Becomes the Target

After the incident, Saayman moved quickly. He wiped all his devices, reset every credential, and began adopting hardware security keys alongside improved publishing workflows.

In a public GitHub comment, he acknowledged falling victim to “a pretty well known social engineering attack” and was candid about how thoroughly the attacker had taken over his environment. 

Post-Incident Recovery Steps by Axios Maintainer (Source - Socket.dev)
Post-Incident Recovery Steps by Axios Maintainer (Source – Socket.dev)

His response reflected both the weight of what happened and a genuine commitment to rebuilding more securely.

This attack mirrors a pattern seen before — most notably in the xz utils backdoor — where attackers invest real time in building credibility before making their move.

It is a long-game approach that purely technical controls cannot stop, because the entry point is the person, not the software. When reaching a maintainer means reaching the entire dependency tree below them, attackers will always treat that access as worth any effort.

Organizations using Axios should audit their dependency trees for the compromised versions 1.8.2 and 1.8.3 and update immediately. Developers should also use dependency scanning to catch unexpected version changes.

Open source maintainers — especially those managing widely used packages — should adopt hardware security keys, limit session exposure, and treat their own machines as high-value infrastructure targets.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitSecurity

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Malicious ‘ChatGPT Ad Blocker’ Steals Chrome Extension

Next Post

Hackers Exploit Trusted Platforms to Steal Philippine

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Use Hugging Face & ClawHub to Deploy Malware
May 8, 2026
Fake Moustache Bypasses Age Verification, Raises Online Safety
May 8, 2026
Infostealer Uses GitHub Releases for Payload Hosting & Evasion
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us