Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy
May 5, 2026
ScarCruft Supply Chain Attack Hits Gaming with Platform Windows
May 5, 2026
Silver Fox Deploys ValleyRAT & ABCDoor Via Fake Uses Notices
May 5, 2026
Home/CyberSecurity News/Axios NPM Packages Compromised in Supply Chain Attack
CyberSecurity News

Axios NPM Packages Compromised in Supply Chain Attack

Axios, one of the most heavily adopted HTTP clients within the JavaScript ecosystem, has fallen victim to a sophisticated supply chain attack. The compromise occurred through the introduction of a...

Sarah simpson
Sarah simpson
March 31, 2026 3 Min Read
0 0

Axios, one of the most heavily adopted HTTP clients within the JavaScript ecosystem, has fallen victim to a sophisticated supply chain attack. The compromise occurred through the introduction of a malicious transitive dependency into the official npm registry.

Serving as a critical component across frontend frameworks, backend microservices, and enterprise applications, Axios records approximately 83 million weekly downloads on npm.

The compromise involves the unauthorized publication of new Axios versions that automatically pull in [email protected], a newly published package confirmed by automated malware detection systems to contain malicious code.

Because of the widespread integration of Axios in modern web development, the potential blast radius of this supply chain poisoning is exceptionally broad, necessitating immediate incident response protocols from downstream users.

The threat actors executed this attack by breaking from the project’s standard release patterns. Typically, Axios maintainers publish tagged releases on GitHub concurrently with their npm publishes. However, the compromised npm versions do not appear in the project’s official GitHub repository tags.

Axios NPM Packages Compromised

At the time of the incident, v1.14.0 remained the most recent visible tag on GitHub, indicating that the malicious updates were pushed directly to the npm registry outside of the normal deployment pipeline.

This bypass of standard version control suggests a highly coordinated effort to inject malicious code silently. The malicious payload dependency, [email protected], was published to the registry on March 30, 2026, at 23:59:12 UTC.

Within minutes of this publication, the compromised Axios versions were pushed live. Automated malware detection by Socket flagged the anomalous plain-crypto-js package shortly after at 00:05:41 UTC on March 31, highlighting the rapid execution sequence designed to maximize infection before security tools could react.

To evade immediate detection during the initial infection phase, the attackers introduced minimal alterations to the primary Axios codebase. The sole modification was adding the malicious plain-crypto-js package to the dependency tree.

Utilizing small, targeted changes is a conventional and highly effective tactic in supply chain attacks. This approach allows threat actors to execute arbitrary code through transitive dependencies while avoiding the scrutiny that typically accompanies large codebase modifications or logic changes.

Investigations into the registry logs reveal that the malicious package is associated with the npm publisher account jasonsaayman. The appearance of this account in the compromised dependency chain raises significant concerns regarding unauthorized package publishing capabilities.

It points toward a potential account takeover, compromised developer credentials, or a hijacked session token that allowed the attackers to authenticate and publish the malicious artifacts directly to the npm registry.

Security teams, DevOps engineers, and developers must immediately audit their software supply chains to identify and remove the compromised components. Project maintainers should thoroughly review project lockfiles, dependency graphs, feature branches, and open pull requests for any exposure to the affected versions.

Compromised Package Version Malicious Dependency
Axios 1.14.1 [email protected] 
Axios 0.30.4 [email protected] 
plain-crypto-js 4.2.1 Primary Malicious Payload 

If any of these specific package versions are detected within your environment, it is imperative to remove them entirely or roll back your dependencies to a known safe release, such as Axios 1.14.0, to prevent the execution of the injected code.

Because this remains an active and rapidly developing security incident, ongoing threat hunting and continuous monitoring are necessary to determine the full scope of the compromise and prevent further exploitation.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Claude AI Finds Zero-Day RCE Flaws in Vim Discovers Vulnerabilities

Next Post

Notepad++ v8.9.3 Released Addressing cURL Security Vulnerability

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DAEMON Tools Hacked: Supply Chain Attack Software Deliver
May 5, 2026
AiTM Attack: Code of Conduct Phishing Emails Target
May 5, 2026
Attackers Abuse Amazon SES for Authenticated Ph Send Phishing
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us