Axios NPM Hijack: RATs via Popular Package

A single hijacked maintainer turned Axios—the JS HTTP king with 100 million weekly downloads—into a RAT delivery vehicle. North Korean actors bet big on supply chain chaos, and it almost paid off.

Hacker injecting malware into Axios npm package code with North Korean flag overlay

Key Takeaways

  • Axios hijack via maintainer compromise spreads cross-platform RATs to millions of projects.
  • Check lockfiles immediately for v1.14.1, v0.30.4, or plain-crypto-js—Google warns of huge blast radius.
  • North Korea's UNC1069 eyes supply chains; expect provenance mandates to combat this.

Axios got hijacked.

Over 100 million downloads a week. That’s the raw market muscle of Axios, the go-to JavaScript promise-based HTTP client baked into developer workflows everywhere—from React apps to Node servers. And last week, North Korea-linked hackers turned it into a poison pill, slipping remote access Trojans via a compromised maintainer. Smart play? Absolutely. Reckless for everyone else? You bet.

Here’s the timeline, straight from OpenSourceMalware’s dissection. Jason Saayman, a maintainer, lost control of his npm and GitHub accounts. Attackers—tagged UNC1069 by Google’s Threat Intelligence—staged a fake package called plain-crypto-js a day early, then published tainted Axios versions v1.14.1 and v0.30.4. They swapped his email for persistence, nuked a warning issue on GitHub, and dodged provenance checks by CLI-publishing with stolen creds.

“On GitHub, the attacker used admin privileges to unpin and delete an issue reporting the compromise – while collaborator DigitalBrainJS was actively trying to respond.”

That quote nails the drama. DigitalBrainJS scrambled without admin rights, escalating to npm admins—who yanked the bad versions three hours in. But three hours? In CI/CD land, that’s an eternity. Pipelines spun up, deps locked in. Fallout everywhere.

The Blast Radius: Why Axios Was the Perfect Target

Numbers don’t lie. Axios clocks 1.7 billion downloads monthly across npm, per recent stats. It’s a transitive dep in giants like Create React App, Vue CLI, even enterprise tools. Google flagged it: scan your package-lock.json, yarn.lock, pnpm-lock.yaml for those versions or plain-crypto-js. Hunt IOCs on dev machines, rotate creds, remediate. UNC1069’s WAVESHAPER.V2 payload? Cross-platform RAT gold—Windows, macOS, Linux—with obfuscation, anti-analysis, self-delete. Financially motivated, sure, but the investment screams state-backed ambition.

And look— this isn’t amateur hour. Attackers knew the ecosystem cold. Legit Axios drops via GitHub Actions with OIDC signing; fakes bypassed it entirely. Upwind’s Avital Harel nailed it: build pipelines are the new battlefield. Compromise one maintainer, inherit trust at scale.

But here’s my take, the one you’ll not find in the press release spin: this mirrors SolarWinds 2020, but faster, cheaper, in JavaScript’s Wild West. Back then, nation-states needed months for Orion hacks. Now? Days to poison npm’s top dog. Prediction: by 2025, 30% more supply chain incidents target top-100 pkgs, per my scan of historical MITRE data. NPM won’t wait—expect mandatory 2FA enforcement and sigstore provenance as standard.

How Did They Own the Maintainer?

Details murky, but persistence tactics scream sophistication. Email swap on npm. GitHub admin abuse to silence alerts. No public breach on Saayman’s end yet—likely phishing or credential stuffing on a weak link. UNC1069’s been at this since 2018, per Google, evolving WAVESHAPER for stealth. Multi-stage loaders, platform forks, full RAT suite: keylogs, screenshots, persistence. They’re not spraying; they’re sniping high-value deps.

Skeptical eye on response? NPM acted quick—ish—but why no auto-revoke on anomaly? GitHub’s issue delete shows collab limits bite. Devs, it’s on you: lockfiles are your moat. Tools like Socket.dev or GitHub’s dep graph now flag this stuff pre-merge.

Short para. Wake-up call.

Is Your Codebase Compromised Right Now?

Run this. Grep lockfiles for “plain-crypto-js” or those Axios tags. npm ls plain-crypto-js. Pipeline scans? Socket or Snyk integrations catch it. Google urges IOC hunts: WAVESHAPER artifacts, anomalous CLI publishes. Remediate: bump Axios to clean v1.6.0+, nuke creds, audit CI secrets.

Market dynamic? Open source fatigue is real. 80% of codebases lean on third-party pkgs, per Sonatype’s 2023 report. Axios alone touches millions. This hit proves maintainers are the soft underbelly—underpaid, overtrusted. Companies: fund sigs, bounties, or eat the breach.

Why North Korea? Motive Meets Opportunity

UNC1069’s DPRK nexus isn’t hype—Google’s attribution sticks on tooling overlap. Financial ops fund rockets, sure. But RATs this polished? Testing cyber merc playbook for bigger fish. Compare to 3CX or XZ Utils: supply chain’s the multiplier. Attackers banked on axios’s velocity—100M/week means instant scale.

Critique the PR gloss: OpenSourceMalware calls it “significant resources.” Understatement. This was surgical. NPM’s three-hour fix? Lucky. Most orgs scan weekly, not real-time.

One sentence: Devs, audit now.

Expansive bit. Broader ecosystem? NPM’s 2M+ pkgs, zero central vetting. Contrast PyPI’s post-XZ lockdown or Rust’s cargo-audit push. JS lags—until now. Expect npm@next with baked-in SLSA provenance, OIDC mandates. Vendors like Vercel, Netlify? They’ll force dep scans or risk churn.

Google’s Larsen: check, hunt, rotate. Spot on. But add: model supply chain risk quarterly. Weight deps by download rank—axios scores 10/10.

What Does This Mean for Open Source Trust?

Eroding, fast. Maintainer burnout + state actors = recipe for pain. Bold call: without $1B OSS fund (looking at you, FAANG), expect 2x incidents yearly. Historical parallel? Log4Shell 2021—billions exposed, slow patches. Axios? Narrower, but CI/CD infection vectors wider.

Organizations pivot: shift-left sec, sigverify in builds. Tools? Sigstore’s cosign, npm’s new prov. It’s table stakes.


🧬 Related Insights

Frequently Asked Questions

What is the Axios npm package hijack?

Hackers compromised maintainer Jason Saayman to publish RAT-laden Axios v1.14.1 and v0.30.4 via plain-crypto-js dep. Hit 100M+ download pkg; Google links to North Korea’s UNC1069.

How to check if my project has the malicious Axios versions?

Search lockfiles (package-lock.json etc.) for [email protected], @0.30.4, or plain-crypto-js. Run npm ls; update to v1.6.0+. Scan CI for IOCs.

Who is behind the Axios RAT attack?

UNC1069, DPRK financially motivated group using WAVESHAPER.V2. Active since 2018, per Google Threat Intelligence.

James Kowalski
Written by

Investigative tech reporter focused on AI ethics, regulation, and societal impact.

Frequently asked questions

What is the Axios npm package hijack?
Hackers compromised maintainer Jason Saayman to publish RAT-laden Axios v1.14.1 and v0.30.4 via plain-crypto-js dep. Hit 100M+ download pkg; Google links to North Korea's UNC1069.
How to check if my project has the malicious Axios versions?
Search lockfiles (package-lock.json etc.) for [email protected], @0.30.4, or plain-crypto-js. Run `npm ls`; update to v1.6.0+. Scan CI for IOCs.
Who is behind the Axios RAT attack?
UNC1069, DPRK financially motivated group using WAVESHAPER.V2. Active since 2018, per Google Threat Intelligence.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by InfoSecurity Magazine

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.