← Back to blog

Deep Dive: Supply Chain Attack (Axios)

Brandon · April 10, 2026
deep divesecuritydevopsnpmci/cd

What Happened?

An attacker gained access to the npm credentials of an axios maintainer and released two malicious packages to the npm registry. (version 1.14.1 and version 0.30.4). These versions introduced a remote access trojan (RAT) adding plain-crypto-js as a dependency. It’s purpose was to run a postinstall script that would download platform-specific payloads from a remote server and execute them. The payload itself is the RAT and allows the attacker to gain access to the victim’s system and establish a persistent backdoor.

What to do now?

Immediate Actions

Pin your axios version to safe versions

npm install axios@1.14.0

Remove any malicious dependencies & clean install

rm -rf node_modules/plain-crypto-js
npm ci

If you have any compromised versions of axios, treat it as if it’s compromised and rotate all your keys or secrets.

CI/CD Pipeline