Key Takeaway
Axios npm versions 1.14.1 and 0.30.4 were tampered to inject the malicious package plain-crypto-js 4.2.1, delivering a cross-platform trojan affecting Windows, macOS, and Linux. The malware targets developer credentials, cloud tokens, and SSH keys stored on infected hosts and establishes persistence via OS-native mechanisms. Organizations should audit installed Axios versions, remove plain-crypto-js, rotate all secrets from exposed environments, and rebuild affected CI/CD runners from clean images.
Malware Family and Delivery Mechanism
A supply chain attack targeting the widely used Axios HTTP client npm package has introduced a trojan capable of running on Windows, macOS, and Linux. The malicious code was embedded in two tampered Axios releases — versions 1.14.1 and 0.30.4 — published to the npm registry. Both versions inject a rogue package called plain-crypto-js version 4.2.1 as a dependency, which serves as the primary delivery vehicle for the payload.
Axios is one of the most downloaded packages in the npm ecosystem, with hundreds of millions of weekly downloads. Any project that updated to either compromised version during the window of availability would have pulled down plain-crypto-js automatically during dependency resolution, requiring no user interaction beyond a standard npm install.
StepSecurity identified the malicious dependency and flagged both releases. The attack mirrors a classic dependency confusion or package hijacking pattern: a legitimate, trusted package is modified to declare a dependency on a malicious package that masquerades as a known cryptography library.
Capabilities: Persistence, Exfiltration, and C2
Persistence
The trojan delivered via plain-crypto-js establishes persistence on all three target operating systems using platform-native mechanisms. On Windows, it writes entries to the registry run keys (HKCU\Software\Microsoft\Windows\CurrentVersion\Run) and may drop scheduled tasks. On Linux and macOS, it targets cron jobs and LaunchAgents respectively, ensuring execution survives reboots without requiring elevated privileges at the initial infection stage.
Data Exfiltration
Once resident, the malware collects environment variables, system metadata, and credential-adjacent data from the infected host. Given its deployment context — developer machines and CI/CD pipeline runners — the highest-value targets are source code repositories, cloud provider credentials (AWS, GCP, Azure), API tokens stored in .env files, and SSH private keys. The malware reads common credential storage locations across all three platforms and stages collected data for transmission.
Command and Control
The payload communicates with a remote C2 endpoint over HTTPS to blend with legitimate traffic. Beacon intervals and C2 infrastructure details are embedded within the plain-crypto-js package itself. At time of publication, the specific C2 domains and IP addresses are under analysis, with threat intelligence feeds from StepSecurity being the primary source tracking live infrastructure.
Affected Platforms
- Windows (all versions supporting Node.js runtime)
- macOS (all versions supporting Node.js runtime)
- Linux (all distributions supporting Node.js runtime)
Any environment running Node.js that installed Axios 1.14.1 or 0.30.4 is potentially compromised. This includes developer workstations, CI/CD systems (GitHub Actions runners, Jenkins agents, GitLab CI), containerized build environments, and production Node.js applications that perform dependency installation at runtime.
Organizations using dependency lockfiles (package-lock.json or yarn.lock) that were generated or updated after the malicious versions were published are at risk if those lockfiles pinned either compromised release.
Immediate Remediation Steps
1. Audit installed versions.
Run npm list axios across all affected repositories and pipelines. Flag any environment reporting version 1.14.1 or 0.30.4.
2. Check for plain-crypto-js.
Run npm list plain-crypto-js to detect whether the malicious package was installed. Presence of version 4.2.1 confirms exposure.
3. Downgrade or upgrade Axios.
Revert to Axios 1.7.9 (the last confirmed clean stable release in the 1.x line) or wait for an official patched release from the Axios maintainers. Verify package integrity using npm audit and by inspecting the package.json and lockfile diffs.
4. Rotate all secrets. Any host that ran the compromised package should be treated as fully compromised. Rotate AWS IAM keys, GCP service account credentials, GitHub tokens, SSH keys, and any other secrets accessible from that environment.
5. Rebuild affected containers and runners. Do not attempt to clean infected CI/CD runners in place. Tear down and provision fresh instances from a known-good base image.
Detection Signatures
File-based indicators:
- Presence of
node_modules/plain-crypto-js/in any project directory plain-crypto-jsversion4.2.1inpackage-lock.jsonoryarn.lock
YARA rule (conceptual):
rule axios_supply_chain_plain_crypto_js {
strings:
$pkg = "plain-crypto-js" ascii
$ver = "4.2.1" ascii
condition:
all of them
}
npm audit:
Run npm audit --audit-level=high after updating your local advisory database. Advisories for plain-crypto-js@4.2.1 should surface once registries propagate the malicious package flag.
SIEM/EDR detections:
- Outbound HTTPS connections originating from Node.js processes to previously unseen external hosts
- Registry write events (
HKCU\Software\Microsoft\Windows\CurrentVersion\Run) initiated bynode.exe - New cron entries or LaunchAgent plist files created by user-space Node.js processes
- File read events targeting
.env,~/.aws/credentials,~/.ssh/id_rsafrom Node.js child processes
SocTeams should query EDR telemetry for the window between when the compromised packages were published and when they were removed from the registry, treating all matches as confirmed compromise requiring full incident response.
Original Source
The Hacker News
Related Articles
Horabot Dropper Delivers Casbaneiro Banking Trojan to Latin American and European Targets in Brazilian eCrime Campaign
The Horabot dropper, attributed to Brazilian cybercrime group Augmented Marauder (also tracked as Water Saci by Trend Micro), delivers the Casbaneiro banking trojan to Spanish-speaking users across Latin America and Europe via targeted phishing campaigns. Casbaneiro performs credential harvesting through overlay attacks, clipboard hijacking, and keylogging, and abuses compromised Outlook accounts to self-propagate. SOC teams should implement scheduled task creation detections, block newly registered TLD outbound connections, and immediately rotate credentials on any confirmed infected host.
REF1695: Fake Installers Deliver RATs and Cryptominers in CPA Fraud Operation Active Since November 2023
REF1695 is a financially motivated campaign tracked by Elastic Security Labs that has deployed RATs and cryptocurrency miners via fake software installers since November 2023. The operation monetizes infections through both passive cryptomining and CPA fraud, redirecting victims to content locker pages disguised as software registration flows. Windows endpoints are the confirmed target, and Elastic has released EQL detection rules to support identification and response.
Automated Service Enables Persistent Information-Stealing Social Engineering Attacks
A new cybercrime service automates persistent social engineering attacks aimed at stealing sensitive information. Targeting primarily Windows and mobile platforms, the service uses phishing techniques combined with encrypted exfiltration and adaptive persistence. Detection relies on monitoring phishing indicators and network anomalies, while removal requires credential resets and endpoint remediation.
NoVoice Android Malware Exploits Known Vulnerabilities to Gain Root Access, Found in 50+ Google Play Apps
NoVoice is a newly discovered Android malware exploiting known privilege escalation vulnerabilities to gain root access. Distributed through over 50 malicious apps on Google Play with 2.3 million downloads, it collects user data and communicates with encrypted C2 servers. Detection requires monitoring root-level activity and network anomalies, while removal demands a factory reset and patching affected devices.