Axios NPM Supply Chain Attack Delivering Platform-Specific RATs
A supply chain attack on the Axios NPM package injected malicious code into versions v1.14.1 and v0.30.4, leading to the deployment of platform-specific remote access trojans (RATs) after the installation of a rogue dependency that communicated with attacker-controlled infrastructure to retrieve malicious payloads for Windows, MacOS, and Linux.
On March 31, 2026, the official Axios node package manager (npm) package was compromised in a supply chain attack. The attack resulted in the deployment of two malicious versions, v1.14.1 and v0.30.4. Axios is a widely-used JavaScript library for making HTTP requests, with approximately 100 million downloads per week. The malicious packages were available for around three hours. The compromised packages introduced a fake runtime dependency, ‘plain-crypto-js’, that executes automatically after installation. This dependency then communicates with attacker-controlled infrastructure at 142.11.206.73, pulling down platform-specific payloads for Linux, MacOS, and Windows. The payloads are remote access trojans (RATs), enabling the attackers to gather information and execute additional malicious activities.
Attack Chain
- The attacker compromised the Axios NPM package and injected malicious code.
- Malicious versions v1.14.1 and v0.30.4 were published to the NPM registry.
- The malicious packages introduce a fake runtime dependency named ‘plain-crypto-js’.
- Upon installation of the compromised package, the ‘plain-crypto-js’ dependency executes automatically via a post-install script.
- The dependency connects to the attacker-controlled IP address 142.11.206.73 to retrieve a platform-specific payload.
- On MacOS, a binary named “com.apple.act.mond” is downloaded and executed using zsh.
- On Windows, a PowerShell script (6202033.ps1) is downloaded, and the legitimate powershell.exe is copied to “%PROGRAM DATA%\wt.exe”, and the ps1 script is executed with hidden and execution policy bypass flags.
- On Linux, a Python backdoor is downloaded and executed. The downloaded executables act as Remote Access Trojans (RATs) exfiltrating credentials and enabling remote management.
Impact
This supply chain attack could lead to significant compromise across numerous organizations using the Axios library. The actors exfiltrate credentials and gain remote management capabilities. All credentials present on systems that installed the malicious package should be considered compromised and immediately rotated. The widespread use of Axios means the impact could extend to many applications and systems, potentially enabling further attacks leveraging compromised credentials. Supply chain attacks like these affecting widely used libraries, as seen in 25% of the top 100 vulnerabilities in the Cisco Talos 2025 Year in Review, highlight the substantial risk they pose.
Recommendation
- Roll back to safe Axios versions (v1.14.0 or v0.30.3) immediately to prevent further compromise, as mentioned in the overview.
- Investigate systems that downloaded malicious packages (v1.14.1 or v0.30.4) for signs of follow-on payloads from the actor-controlled infrastructure, as described in the overview.
- Block the actor-controlled IP address 142.11.206.73 and domain Sfrclak.com at the network perimeter to prevent further communication with the malicious infrastructure, per the IOC list.
- Monitor for execution of PowerShell scripts from unusual locations, specifically “%PROGRAM DATA%\wt.exe”, as part of the attack chain.
- Implement a process creation rule to alert when processes connect to external IPs using uncommon parent processes. See example rule below.
Detection coverage 2
Detect Suspicious Process Connecting to Known Malicious IP
highDetects processes establishing network connections to the actor-controlled IP address.
Detect Suspicious PowerShell Execution from ProgramData
highDetects powershell execution from the ProgramData directory, indicating potential execution of the downloaded ps1 script.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
domain
5
hash_sha256
1
ip
| Type | Value |
|---|---|
| ip | 142.11.206.73 |
| domain | Sfrclak.com |
| hash_sha256 | e10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09 |
| hash_sha256 | fcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf |
| hash_sha256 | 617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101 |
| hash_sha256 | 92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a |
| hash_sha256 | ed8560c1ac7ceb6983ba995124d5917dc1a00288912387a6389296637d5f815c |