Supply chain compromise of axios npm package delivers cross-platform RATs via malicious dependency
Summary
Hide ▲
Show ▼
A North Korea-nexus threat actor (UNC1069) compromised the npm account of axios maintainer Jason Saayman via a two-week social engineering campaign and published malicious axios versions v1.14.1 and v0.30.4 containing the plain-crypto-js dependency to deliver cross-platform RATs with full unilateral control capabilities, bypassing 2FA. The attack’s blast radius has expanded beyond developer ecosystems after OpenAI revealed that a GitHub Actions workflow used for macOS app signing downloaded the malicious axios library, prompting OpenAI to revoke its macOS app certificate as a precaution despite no evidence of compromise. This incident underscores the escalating risks of supply chain compromises, with Google warning that hundreds of thousands of stolen secrets from the axios and Trivy attacks could fuel further software supply chain attacks, SaaS compromises, ransomware, and cryptocurrency theft. The campaign reflects an industrialized social engineering model targeting high-value individuals and open source maintainers, leveraging AI-enhanced trust-building and matured attacker tooling. Additional supply chain attacks in March 2026, such as the compromise of Trivy by TeamPCP (UNC6780), have compounded the threat landscape, exposing organizations like the European Commission and Mercor to downstream risks.
Timeline
-
01.04.2026 12:00 3 articles · 12d ago
Malicious axios npm packages v1.14.1 and v0.30.4 deliver cross-platform RATs via plain-crypto-js dependency
OpenAI disclosed that a GitHub Actions workflow used to sign its macOS apps downloaded the malicious axios version 1.14.1 on March 31, with the workflow having access to OpenAI's certificate and notarization material used for signing ChatGPT Desktop, Codex, Codex CLI, and Atlas. OpenAI confirmed no evidence of user data compromise, system intrusion, or software alteration, but treated the certificate as compromised and revoked it as a precautionary measure. Despite the absence of detected compromise, OpenAI will block older macOS desktop apps signed with the revoked certificate by default starting May 8, 2026, urging users to update to versions signed with the new certificate: ChatGPT Desktop 1.2026.071, Codex App 26.406.40811, Codex CLI 0.119.0, and Atlas 1.2026.84.2. This development expands the blast radius of the axios supply chain compromise to include OpenAI's software distribution pipeline.
Show sources
- Hackers Hijack Axios npm Package to Spread RATs — www.infosecurity-magazine.com — 01.04.2026 12:00
- Axios Attack Shows Social Complex Engineering Is Industrialized — www.darkreading.com — 06.04.2026 23:55
- OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident — thehackernews.com — 13.04.2026 09:50
Information Snippets
-
Threat actors compromised the npm account of axios maintainer Jason Saayman and injected plain-crypto-js as a dependency into axios versions v1.14.1 and v0.30.4.
First reported: 01.04.2026 12:002 sources, 2 articlesShow sources
- Hackers Hijack Axios npm Package to Spread RATs — www.infosecurity-magazine.com — 01.04.2026 12:00
- Axios Attack Shows Social Complex Engineering Is Industrialized — www.darkreading.com — 06.04.2026 23:55
-
Malicious packages were published directly via npm CLI using stolen credentials, bypassing legitimate GitHub Actions OIDC provenance signing workflows.
First reported: 01.04.2026 12:002 sources, 2 articlesShow sources
- Hackers Hijack Axios npm Package to Spread RATs — www.infosecurity-magazine.com — 01.04.2026 12:00
- Axios Attack Shows Social Complex Engineering Is Industrialized — www.darkreading.com — 06.04.2026 23:55
-
Attackers modified Saayman’s email address for persistence and hijacked his GitHub account, deleting an issue reporting the compromise to evade detection.
First reported: 01.04.2026 12:002 sources, 2 articlesShow sources
- Hackers Hijack Axios npm Package to Spread RATs — www.infosecurity-magazine.com — 01.04.2026 12:00
- Axios Attack Shows Social Complex Engineering Is Industrialized — www.darkreading.com — 06.04.2026 23:55
-
Google Threat Intelligence Group (GTIG) attributed the activity to UNC1069, a financially motivated North Korea-nexus threat actor active since at least 2018, based on the use of WAVESHAPER.V2 malware variant.
First reported: 01.04.2026 12:003 sources, 3 articlesShow sources
- Hackers Hijack Axios npm Package to Spread RATs — www.infosecurity-magazine.com — 01.04.2026 12:00
- Axios Attack Shows Social Complex Engineering Is Industrialized — www.darkreading.com — 06.04.2026 23:55
- OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident — thehackernews.com — 13.04.2026 09:50
-
The malicious payloads include platform-specific RAT binaries with obfuscation, anti-analysis techniques, and self-deletion mechanisms designed to evade modern detection.
First reported: 01.04.2026 12:001 source, 1 articleShow sources
- Hackers Hijack Axios npm Package to Spread RATs — www.infosecurity-magazine.com — 01.04.2026 12:00
-
Axios is downloaded over 100 million times weekly and is used as a dependency in countless developer environments and CI/CD pipelines, amplifying the blast radius of the supply chain compromise.
First reported: 01.04.2026 12:002 sources, 2 articlesShow sources
- Hackers Hijack Axios npm Package to Spread RATs — www.infosecurity-magazine.com — 01.04.2026 12:00
- Axios Attack Shows Social Complex Engineering Is Industrialized — www.darkreading.com — 06.04.2026 23:55
-
Maintainer Jason Saayman was deceived in a two-week social engineering campaign involving a cloned founder persona and a convincing Slack workspace prior to compromise.
First reported: 06.04.2026 23:551 source, 1 articleShow sources
- Axios Attack Shows Social Complex Engineering Is Industrialized — www.darkreading.com — 06.04.2026 23:55
-
Attackers tricked Saayman into installing a RAT via a fake missing file prompt during a Microsoft Teams meeting despite 2FA being enabled for his npm account.
First reported: 06.04.2026 23:551 source, 1 articleShow sources
- Axios Attack Shows Social Complex Engineering Is Industrialized — www.darkreading.com — 06.04.2026 23:55
-
The RAT delivered via the malicious axios packages provided the attackers with full unilateral control over the compromised developer's computer.
First reported: 06.04.2026 23:551 source, 1 articleShow sources
- Axios Attack Shows Social Complex Engineering Is Industrialized — www.darkreading.com — 06.04.2026 23:55
-
Security researcher Taylor Monahan detailed the social engineering playbook, noting the attackers' use of slow-burn tactics, rescheduling calls, and targeting high-value individuals like cryptocurrency founders and venture capital executives.
First reported: 06.04.2026 23:551 source, 1 articleShow sources
- Axios Attack Shows Social Complex Engineering Is Industrialized — www.darkreading.com — 06.04.2026 23:55
-
Development security vendor Socket reported extensive targeting of open source software community members, including Socket engineers and CEO Feross Aboukhadijeh, using the same social engineering playbook.
First reported: 06.04.2026 23:551 source, 1 articleShow sources
- Axios Attack Shows Social Complex Engineering Is Industrialized — www.darkreading.com — 06.04.2026 23:55
-
Experts highlight that North Korea-nexus threat actors have industrialized social engineering campaigns, using AI to lower trust-building costs, matured attacker tooling, and ClickFix-like delivery mechanisms to scale operations.
First reported: 06.04.2026 23:551 source, 1 articleShow sources
- Axios Attack Shows Social Complex Engineering Is Industrialized — www.darkreading.com — 06.04.2026 23:55
-
The Axios attack reflects a broader trend where traditional social engineering targets (e.g., cryptocurrency executives) are now being complemented by targeting open source maintainers due to the massive blast radius of compromised packages.
First reported: 06.04.2026 23:551 source, 1 articleShow sources
- Axios Attack Shows Social Complex Engineering Is Industrialized — www.darkreading.com — 06.04.2026 23:55
-
OpenAI revealed that a GitHub Actions workflow used for macOS app signing downloaded the malicious Axios version 1.14.1 on March 31, with the workflow having access to OpenAI's certificate and notarization material used for signing ChatGPT Desktop, Codex, Codex CLI, and Atlas.
First reported: 13.04.2026 09:502 sources, 2 articlesShow sources
- OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident — thehackernews.com — 13.04.2026 09:50
- OpenAI rotates macOS certs after Axios attack hit code-signing workflow — www.bleepingcomputer.com — 13.04.2026 20:39
-
OpenAI confirmed no evidence of user data compromise, system intrusion, or software alteration, but treated the certificate as compromised and revoked it as a precautionary measure.
First reported: 13.04.2026 09:501 source, 1 articleShow sources
- OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident — thehackernews.com — 13.04.2026 09:50
-
OpenAI stated that older macOS desktop apps signed with the revoked certificate will be blocked by macOS security protections by default starting May 8, 2026, and users are urged to update to versions signed with the new certificate: ChatGPT Desktop 1.2026.071, Codex App 26.406.40811, Codex CLI 0.119.0, and Atlas 1.2026.84.2.
First reported: 13.04.2026 09:502 sources, 2 articlesShow sources
- OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident — thehackernews.com — 13.04.2026 09:50
- OpenAI rotates macOS certs after Axios attack hit code-signing workflow — www.bleepingcomputer.com — 13.04.2026 20:39
-
Google warned that hundreds of thousands of stolen secrets from the Axios and Trivy supply chain attacks could fuel further software supply chain attacks, SaaS environment compromises, ransomware, extortion events, and cryptocurrency theft.
First reported: 13.04.2026 09:501 source, 1 articleShow sources
- OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident — thehackernews.com — 13.04.2026 09:50
Similar Happenings
Targeted social engineering of Axios maintainer enables UNC1069 npm supply chain compromise via WAVESHAPER.V2 implant
A maintainer of the widely used Axios npm package was targeted in a highly tailored social engineering campaign attributed to North Korean threat actor UNC1069, resulting in the compromise of npm account credentials and the publication of two trojanized versions of Axios (1.14.1 and 0.30.4). Google Threat Intelligence Group (GTIG) attributed the attack to UNC1069 based on the use of WAVESHAPER.V2 and infrastructure overlaps with past activities. The malicious packages were available for roughly three hours and injected a plain-crypto-js dependency that installed a cross-platform RAT, enabling credential theft and downstream compromise. The campaign also targeted additional maintainers, including Pelle Wessman (Mocha framework) and Node.js core contributors, revealing a coordinated effort against high-impact maintainers. The intrusion began with reconnaissance-driven impersonation of a legitimate company founder, engagement via a cloned Slack workspace and Microsoft Teams call, and execution of a fake system update that deployed the RAT. Post-incident, the maintainer reset devices, rotated all credentials, adopted immutable releases, introduced OIDC-based publishing flows, and updated GitHub Actions workflows to mitigate future risks.
Ongoing Ghost Cluster Targets npm and GitHub in Multi-Stage Credential and Crypto Wallet Theft Campaign
A coordinated campaign tracked as Ghost continues to target developers via malicious npm packages and GitHub repositories to deploy credential stealers and cryptocurrency wallet harvesters. The operation leverages social engineering and multi-stage infection chains, including fake installation wizards that request sudo/administrator privileges and deceptive npm logs simulating dependency downloads and progress indicators. Stolen data—including browser credentials, crypto wallets, SSH keys, and cloud tokens—is exfiltrated to Telegram channels and BSC smart contracts. The campaign employs a dual monetization model combining credential theft via Telegram channels with affiliate link redirections stored in a BSC smart contract. Malicious npm packages first appeared under the user 'mikilanjijo', with operations beginning as early as February 2026 and expanding to at least 11 packages such as react-performance-suite and react-query-core-utils. The final payload is a remote access trojan that downloads from Telegram channels, decrypts using externally retrieved keys, and executes locally using stolen sudo passwords to harvest credentials and deploy GhostLoader.
Supply chain compromise in Trivy scanner triggers CanisterWorm propagation across CI/CD pipelines
Supply chain compromise in Trivy scanner triggers CanisterWorm propagation across CI/CD pipelines, now expanding to encompass additional open-source ecosystems and attributed to multiple advanced threat actors. The TeamPCP threat group continues to monetize stolen supply chain secrets through partnerships with extortion groups including Lapsus$ and the Vect ransomware operation, with Wiz (Google Cloud) confirming collaboration and horizontal movement across cloud environments. Cisco’s internal development environment was breached using stolen Trivy-linked credentials via a malicious GitHub Action, resulting in the theft of over 300 repositories, including proprietary AI product code and data belonging to corporate customers such as banks, BPOs, and US government agencies. Attackers also abused stolen AWS keys across a subset of Cisco’s cloud accounts, with multiple threat actors observed participating in the breach. New developments include the compromise of the Axios NPM package, a top-10 JavaScript library with over 400 million monthly downloads, via malicious versions 0.27.5 and 0.28.0. The attack delivered a multi-platform RAT through a malicious dependency impersonating crypto-js, with operational sophistication including pre-staging, platform-specific payloads, and anti-forensic cleanup. Initial attribution suggested TeamPCP involvement, but Google attributed the incident to UNC1069, a suspected North Korean actor linked to Lazarus Group, indicating potential actor diversification or false-flag operations. The Axios compromise highlights escalating tradecraft in open-source supply chain attacks, distinct from opportunistic infections and suggesting a focus on access brokering or targeted espionage rather than indiscriminate data theft.
Interlock ransomware leverages Cisco FMC insecure deserialization zero-day (CVE-2026-20131) for root access
A critical insecure deserialization vulnerability in Cisco Secure Firewall Management Center (FMC) Software, tracked as CVE-2026-20131 (CVSS 10.0), is being actively exploited by the Interlock ransomware group to gain unauthenticated remote root access on unpatched systems. The flaw enables unauthenticated remote attackers to bypass authentication and execute arbitrary Java code with root privileges via crafted HTTP requests to a specific endpoint. Exploitation has been observed as a zero-day since January 26, 2026, more than a month before public disclosure and patch availability. Cisco issued its first advisory for CVE-2026-20131 on March 4, 2026, and Amazon Threat Intelligence confirmed active exploitation by Interlock starting in late January. CISA added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog and ordered federal agencies to patch by March 22, 2026, under BOD 22-01. Post-exploitation tooling includes custom JavaScript/Java RATs, PowerShell reconnaissance scripts, Linux reverse proxy configuration tools, memory-resident web shells, and ConnectWise ScreenConnect for persistence. Compromised environments are leveraged for ransomware operations and secondary monetization. AWS’s detailed analysis reveals additional post-exploitation components such as a memory-resident backdoor intercepting HTTP requests, Volatility for RAM credential parsing, and Certify for Active Directory Certificate Services misconfiguration exploitation.
GlassWorm malware targets OpenVSX, VS Code registries
GlassWorm has escalated into a multi-stage framework combining remote access trojans (RATs), data theft, and hardware wallet phishing, with the latest iteration leveraging Solana dead drops for C2, a novel browser extension for surveillance, and a shift into the Model Context Protocol (MCP) ecosystem. The campaign now delivers a .NET binary that targets Ledger and Trezor devices by masquerading as configuration errors and prompting users to input recovery phrases, while a Websocket-based JavaScript RAT exfiltrates browser data, executes arbitrary code, and deploys HVNC or SOCKS proxy modules. The malware uses a Google Chrome extension disguised as Google Docs Offline to perform session surveillance on cryptocurrency platforms like Bybit and harvest extensive browser data. Additionally, threat actors have begun distributing malicious payloads via npm packages impersonating the WaterCrawl MCP server, marking GlassWorm’s first confirmed incursion into the AI-assisted development ecosystem. Recent innovations in the GlassWorm campaign include the introduction of a Zig-compiled dropper embedded within an Open VSX extension named 'specstudio.code-wakatime-activity-tracker', which masquerades as WakaTime. This dropper installs platform-specific Node.js native addons compiled from Zig code that execute outside the JavaScript sandbox with full OS-level access, enabling the threat actor to stealthily infect all IDEs on a developer's machine—including VS Code, VSCodium, Positron, Cursor, and Windsurf. The dropper then downloads a malicious VS Code extension (.VSIX) named 'floktokbok.autoimport' from an attacker-controlled GitHub account, which impersonates a legitimate extension with over 5 million installs and installs silently across all detected IDEs. The second-stage extension avoids execution on Russian systems, communicates with the Solana blockchain for C2, exfiltrates data, and deploys an information-stealing RAT that ultimately installs a malicious Google Chrome extension. Users who installed the malicious extensions should assume compromise and rotate all secrets immediately. The GlassWorm campaign remains a persistent supply chain threat impacting multiple ecosystems including npm, PyPI, GitHub, and Open VSX. Since its emergence in October 2025, the campaign has evolved from invisible Unicode steganography in VS Code extensions to a sophisticated multi-vector operation spanning 151 compromised GitHub repositories and dozens of malicious npm packages. The threat actor, assessed to be Russian-speaking, continues to avoid infecting Russian-locale systems and leverages Solana blockchain transactions as dead drops for C2 resolution. Recent developments include the ForceMemo offshoot that force-pushes malicious code into Python repositories, the abuse of extensionPack and extensionDependencies for transitive malware delivery, and the introduction of Rust-based implants targeting developer toolchains. The Eclipse Foundation and Open VSX have implemented security measures such as token revocation and automated scanning, but the threat actors have repeatedly adapted by rotating infrastructure, obfuscating payloads, and expanding into new ecosystems like MCP servers. A new large-scale social engineering campaign has emerged, using fake VS Code security alerts posted in GitHub Discussions to distribute malware. The campaign automates posts across thousands of repositories using low-activity accounts, triggering GitHub email notifications with fake vulnerability advisories containing realistic CVE references. Links in these posts redirect victims through a cookie-driven chain to drnatashachinn[.]com, where a JavaScript reconnaissance payload profiles targets before delivering additional malicious payloads. This operation represents a coordinated, large-scale effort targeting developers as part of the broader GlassWorm malware campaign.