Axios Supply Chain Attack Deploys Cross-Platform RAT

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Account compromise: On March 31, 2026, an npm account compromise injected the malicious [email protected] package into Axios versions 1.14.1 and 0.30.4.
  • Cross-platform RAT: The injected package successfully deployed cross-platform RAT malware, granting threat actors unauthorized access to affected development environments.
  • Open-source security risks: This high-profile incident highlights critical open-source security risks, emphasizing the immediate need for strict dependency auditing and supply chain verification.

A severe Axios supply chain attack occurred on March 31, 2026, when malicious actors successfully compromised the “jasonsaayman” npm maintainer account of the most popular HTTP client library in the JavaScript ecosystem. This breach allowed the attackers to inject a malicious package, identified as [email protected], directly into Axios versions 1.14.1 and 0.30.4.

Axios Dependency RAT

StepSecurity identified two malicious versions that injected a new dependency never imported anywhere in the axios source code, but that executed a postinstall script acting as a cross-platform remote access trojan (RAT) dropper targeting macOS, Windows, and Linux. 

The dropper established communication with a live command-and-control (C2) server and delivered platform-specific second-stage payloads. The cross-platform architecture significantly widens the attack surface for any software application relying on the affected Axios versions.

The malware seems to have been taken down from npm | Source: GitHub
The malware seems to have been taken down from npm | Source: GitHub

After execution, the malware evaded forensic detection by deleting itself and replacing its own package.json with a clean version. 

The report assessed that the attack was not opportunistic, as the malicious dependency was staged 18 hours in advance. “Three separate payloads were pre-built for three operating systems. Both release branches were hit within 39 minutes,” researchers said.

Escalating Open-Source Security Risks

This Axios supply chain attack is considered one of the “most operationally sophisticated supply chain attacks ever documented against a top-10 npm package,” according to StepSecurity researchers, who have responsibly disclosed the issue to the project maintainers.

Development teams must immediately audit their dependency trees, remove the affected packages, and update their Axios implementations to secure, verified versions. If you have installed [email protected] or [email protected], assume your system is compromised. Recovery steps say users should:

Late last year, a WebRAT campaign targeted researchers via GitHub repositories containing fake PoC exploits for legitimate vulnerabilities, and 17 trojanized NPM packages delivered the Vidar infostealer in November 2025.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: