- March 30, 2026
Critical Supply Chain Attack of NPM Package Axios
On March 30th, An NPM supply chain attack was performed on the widely used NPM package Axios. Axios is one of the most ubiquitous JavaScript libraries. The attack involves a malicious cross-platform Remote Access Trojan (RAT) to macOS, Windows, and Linux systems.
Executive Summary
On March 30th, An NPM supply chain attack was performed on the widely used NPM package Axios. Axios is one of the most ubiquitous JavaScript libraries, and is commonly seen in most JavaScript deployments. The attackers gained access to the NPM credentials of one of the Axios developers and released a malicious package that would fetch and install a cross-platform Remote Access Trojan (RAT) to macOS, Windows, and Linux systems.
The malicious libraries published to NPM were removed within three hours and are not available to download as of the time of publication.
Organizations that are affected should immediately audit to see npm packages to confirm whether axios@1.14.1 or axios@0.30.4 were installed. If so treat the machine as compromised and follow the Mitigations and Workarounds below.
Affected Systems or Products
Product | Affected Version | Unaffected Version |
|---|---|---|
Axios | 1.14.1 | 1.14.0 |
Axios | 0.30.4 | 0.30.3 |
Mitigations / Workarounds
Block the endpoint used for Command and Control for this attack: sfrclak[.]com on port 8000 at the time of the attack this was resolving to 142.11.206.73 If you believe that a machine has already been compromised, we do not advise cleaning in place and recommend re-imaging or rebuilding affected machines from known good images. Using pinned versions of libraries is recommended to prevent this kind of attack if new malicious versions are released for any library. To specifically pin axios to a known unaffected version perform the following depending on your existing version:
npm install axios@1.14.0npm install axios@0.30.3
NPM offers a configuration npm config set min-release-age 3 that will enforce a two to 3 day waiting period on new package releases before installing them on your machine. This is advised for all developers using external packages. For machines running without human interaction, such as CI/CD pipelines we advise not only version pinning of packages but disabling scripts on installs with the --ignore-scripts argument wherever possible.
Patches
While not strictly a patch, ensuring that any installed affected npm packages are removed and purged from your machines is strongly recommended. This involves removing the affected packages and installing pinned versions of the unaffected axios package:
rm -rf node_modules/plain-crypto-jsnpm install --ignore-scriptsnpm cache clean –force
Indicators of Compromise
Network Activity
sfrclak[.]com:8000callnrwise[.]com142.11.206[.]73
Windows Files
%PROGRAMDATA%\wt.exe%PROGRAMDATA%\system.bat%TEMP%\6202033.vbs%TEMP%\6202033.ps1%TEMP%\<GUID>.ps1
Windows Registry Entries
Key: HKCU\Software\Microsoft\Windows\CurrentVersion\RunName: MicrosoftUpdateValue: %PROGRAMDATA%\system.bat
macOS Files
/Library/Caches/com.apple.act.mond/tmp/.XXXXXX.scpt/private/tmp/.*
Linux Files
/tmp/ld.py
File Hashes
Hash (SHA-256) | Description |
|---|---|
fcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf | /tmp/ld.py - linux RAT |
92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a | /Library/Caches/com.apple.act.mond - macOS RAT |
617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101 | %PROGRAMDATA%\wt.exe - Windows RAT |
e10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09 | setup.js – Dropper Script |
f7d335205b8d7b20208fb3ef93ee6dc817905dc3ae0c10a0b164f4e7d07121cd | system.bat – PowerShell Script |
e49c2732fb9861548208a78e72996b9c3c470b6b562576924bcc3a9fb75bf9ff | system.bat – PowerShell Script |
ed8560c1ac7ceb6983ba995124d5917dc1a00288912387a6389296637d5f815c | 6202033 – PowerShell Script |
How Beazley Security is responding
Beazley Security is conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients.
If you believe your organization may have been impacted by this attack campaign and need support, please contact our Incident Response team.