Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Home/Threats/Hackers Spread Cross-Platform Malware via Poisoned Axios
Threats

Hackers Spread Cross-Platform Malware via Poisoned Axios

Attackers weaponized Axios, one of the world’s most widely used JavaScript libraries, on March 30, 2026. By poisoning its npm package, they silently deployed malware onto developer machines...

Marcus Rodriguez
Marcus Rodriguez
April 6, 2026 4 Min Read
4 0

Attackers weaponized Axios, one of the world’s most widely used JavaScript libraries, on March 30, 2026. By poisoning its npm package, they silently deployed malware onto developer machines running Windows, macOS, and Linux.

With over 100 million weekly downloads, Axios is the most popular HTTP client in the JavaScript ecosystem, making this supply chain attack one of the most far-reaching incidents of its kind.

The attack began when an unauthorized actor gained control of the npm account belonging to Jason Saayman, the lead maintainer of the Axios project.

The account’s email was quietly swapped to an attacker-controlled ProtonMail address, giving the intruder full admin-level access.

Using a stolen npm access token, the attacker manually published two poisoned versions — [email protected] and [email protected] — within 39 minutes of each other, covering both the current and legacy release branches.

Neither version has any matching commit, tag, or release in the official Axios GitHub repository.

GitHub issue #10604 — the Axios collaborator confirming the compromised maintainer has admin permissions (Source - Trend Micro)
GitHub issue #10604 — the Axios collaborator confirming the compromised maintainer has admin permissions (Source – Trend Micro)

Peter Girnus and Jacob Santos, Trend Micro researchers conducted a forensic examination of the attack, uncovering its complete infection chain and the extent of its damage.

Their analysis found that the threat had already reached organizations across government, finance, healthcare, manufacturing, retail, and technology sectors at the time of their investigation. Telemetry also confirmed active exploitation during the attack window.

Both poisoned versions contained a single new addition to their package manifest: [email protected], a phantom dependency.

This package was never imported or referenced anywhere in the Axios source code — across all 86 files — and existed purely to trigger npm’s automatic postinstall hook during installation.

Once that hook fired, it dropped a cross-platform remote access trojan (RAT) onto the victim’s machine. After execution, the malware deleted its own dropper script and swapped in a clean decoy, leaving the node_modules folder looking completely normal.

Infection flow of the malicious npm dependency leading to compromise (Source - Trend Micro)
Infection flow of the malicious npm dependency leading to compromise (Source – Trend Micro)

The operation was staged with precision over roughly 18 hours. The attacker first published a clean decoy version of plain-crypto-js to build registry history and avoid raising alarms, then registered the command-and-control server hours later before pushing the malicious payload.

The attack also bypassed GitHub Actions’ OIDC Trusted Publisher safeguards — a control that normally binds npm releases to verified CI workflows — by publishing manually with a stolen token, leaving no cryptographic binding or gitHead reference in the metadata.

Inside the RAT Dropper

The dropper, setup.js, used a two-layer obfuscation system to hide its logic from automated scanners. The inner layer applied a custom XOR cipher with the key “OrDeR_7077” and a quadratic index pattern to scramble character-access sequences.

The outer layer reversed encoded strings, restored base64 padding, and passed the result through the inner cipher.

All module names — covering file system access, shell execution, and platform detection — were decoded at runtime through dynamic require() calls, making them invisible to static analysis tools.

Once running, the dropper detected the operating system and launched a matching payload. On macOS, it fetched a binary via AppleScript and saved it under a path mimicking an Apple system daemon.

On Windows, it used a VBScript launcher to run a PowerShell RAT entirely in memory, using a renamed PowerShell binary disguised as Windows Terminal, with no payload written to disk.

On Linux, it downloaded a Python RAT and launched it as a detached background process orphaned to PID 1, surviving past the npm install session.

The C&C server, sfrclak[.]com, was registered just eight hours before the payload went live — a disposable infrastructure choice designed to limit the attacker’s exposure.

wt.exe executes the final payload entirely in memory, running the attacker's script without writing it to disk (Source - Trend Micro)
wt.exe executes the final payload entirely in memory, running the attacker’s script without writing it to disk (Source – Trend Micro)

Developers who installed the affected versions should immediately pin to [email protected] or [email protected] and remove the plain-crypto-js directory from node_modules.

Any system where RAT artifacts are found should be rebuilt from a known-good state rather than cleaned in place. All credentials accessible during the exposure window — npm tokens, cloud keys, CI/CD secrets, and SSH keys — must be rotated without delay.

Using npm ci –ignore-scripts in CI/CD pipelines blocks postinstall hooks, removing the core execution path this attack relied on. Blocking sfrclak[.]com at the network level is also strongly recommended.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerMalwareThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Hackers Attack Microsoft Teams Users via Malicious Payload

Next Post

Google Bug Bounty Program Hits Record $17M in Google’s All-Time

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Hackers Steal Crypto & Passwords via Fake OpenClaw Installer
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us