Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account
Overview
Axios, a widely used HTTP client, has been compromised in a supply chain attack that affected two of its npm package versions: 1.14.1 and 0.30.4. These versions introduced a malicious dependency called 'plain-crypto-js' version 4.2.1, which was injected using the compromised credentials of the primary Axios maintainer. This incident was reported by StepSecurity, and it raises significant concerns about the security of open-source software, particularly how easily attackers can exploit trusted packages to distribute malicious code. Users and developers relying on these versions should take immediate action to mitigate potential risks. The attack serves as a reminder for the need for stringent security measures within the software supply chain.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: Axios versions 1.14.1 and 0.30.4, npm package ecosystem
- Action Required: Users should update to safe versions of Axios and review their dependency management practices to avoid malicious packages.
- Timeline: Newly disclosed
Original Article Summary
The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a malicious dependency. Versions 1.14.1 and 0.30.4 of Axios have been found to inject "plain-crypto-js" version 4.2.1 as a fake dependency. According to StepSecurity, the two versions were published using the compromised npm credentials of the primary Axios
Impact
Axios versions 1.14.1 and 0.30.4, npm package ecosystem
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Newly disclosed
Remediation
Users should update to safe versions of Axios and review their dependency management practices to avoid malicious packages.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Exploit.