BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Axios NPM Package Compromised via Stolen Token, RAT Deployed to 100M Weekly Downloads

Axios NPM Package Compromised via Stolen Token, RAT Deployed to 100M Weekly Downloads

criticalMalware & Threats|March 31, 20262 min read

Originally reported by Sam Bent

#supply-chain#npm#remote-access-trojan#package-hijacking#developer-tools
Share

TL;DR

The axios NPM package, downloaded 100 million times weekly, was compromised through a stolen authentication token. Malicious versions deployed a cross-platform remote access trojan to developer machines during routine npm install operations.

Why critical?

Supply chain compromise of axios, one of the most widely used NPM packages with 100 million weekly downloads, delivering RAT malware to potentially millions of developer machines.

Axios Package Hijacked Through Stolen NPM Token

The axios HTTP client library, one of JavaScript's most popular packages with over 100 million weekly downloads, was compromised through a stolen NPM authentication token according to security researcher Sam Bent. The attack deployed a cross-platform remote access trojan (RAT) to developer machines running routine npm install operations.

Attack Vector and Impact

Bent's analysis reveals the attackers gained control of the axios package through credential compromise rather than exploiting NPM infrastructure directly. Once authenticated, the threat actors published malicious versions of the package containing embedded RAT functionality.

The timing and scale of the compromise maximized impact. Developers performing morning dependency updates or fresh project installations received the weaponized package automatically. Given axios's ubiquity in the JavaScript ecosystem, the potential victim count extends to millions of developer workstations globally.

Technical Details

The malicious payload appears designed for cross-platform deployment, targeting the diverse development environments typical of modern JavaScript projects. The RAT's capabilities and command-and-control infrastructure remain under analysis, but the supply chain vector provides attackers with extensive access to developer machines and potentially downstream production systems.

Package maintainers have not yet issued official statements regarding the compromise timeline or affected version ranges. NPM's response and remediation efforts are ongoing.

Supply Chain Implications

This incident underscores the fragility of modern software supply chains, where a single compromised credential can weaponize packages trusted by millions of developers. The axios compromise joins a growing list of NPM supply chain attacks targeting high-value packages with extensive dependency trees.

Developers should immediately audit recent axios installations and check for unexpected network activity or system behavior. Organizations should review their dependency management policies and consider implementing additional verification steps for critical packages.

Sources

  • https://www.sambent.com/axios-got-hijacked-and-your-machine-may-be-compromised/

Originally reported by Sam Bent

Tags

#supply-chain#npm#remote-access-trojan#package-hijacking#developer-tools

Related Intelligence

  • Supply Chain Worm Mimics Shai-Hulud Malware, Targets Developers Through npm and AI Tools

    mediumFeb 23, 2026
  • Week in Malware: CISA Adds n8n to KEV, Iran-Linked Wiper Hits Medical Giant

    criticalMar 12, 2026
  • AI Agent Hackerbot-Claw Compromises Microsoft, DataDog, and CNCF GitHub Repositories

    highMar 9, 2026

Related Knowledge

  • NERF Deep Training: Malware Analysis, Reverse Engineering, and Evasion Techniques

    offensive
  • Malware Analysis Deep Dive — NERF Training Module

    dfir
  • DFIR & Threat Hunting Deep Training — NERF Knowledge Base

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Cape Privacy Embeds Free Trip to Switzerland in Policy Terms