What's Happening?
The npm account of 'jasonsaayman' was compromised, resulting in the release of malicious versions of the popular JavaScript HTTP client library, axios. The affected versions, axios@1.14.1 and axios@0.30.4, were published on March 30, 2026, and included
a dependency on plain-crypto-js@4.2.1, which was not part of the original axios source code. This dependency executed a postinstall script that acted as a remote access trojan (RAT) dropper, targeting macOS, Windows, and Linux systems. The trojan contacted a command and control server to deliver platform-specific payloads, then deleted itself to avoid detection. The attack was identified by StepSecurity, which has since disclosed the issue to the axios project maintainers.
Why It's Important?
This incident highlights the vulnerabilities in software supply chains, particularly in open-source ecosystems where dependencies are frequently updated and integrated. The attack on axios, a widely used library with over 100 million weekly downloads, underscores the potential for significant impact on developers and organizations relying on npm packages. The precision and sophistication of the attack, which involved pre-staging malicious dependencies and executing them across multiple platforms, demonstrate the evolving nature of supply chain threats. This event serves as a critical reminder for developers and organizations to implement robust security measures, such as monitoring for anomalous network activity and using tools like StepSecurity Harden-Runner to detect and prevent such compromises.
What's Next?
Developers and organizations using axios are advised to check their projects for the compromised versions and remove any instances of plain-crypto-js from their node_modules directory. StepSecurity is hosting a community town hall on April 1st to discuss the incident and provide guidance on remediation steps. Additionally, npm has taken steps to remove the malicious versions from its registry and replace the compromised package with a security-holder stub. Organizations are encouraged to audit their CI/CD pipelines and rotate any potentially exposed credentials. The broader developer community is urged to adopt security best practices, such as pinning dependencies and using --ignore-scripts during npm installs to prevent unauthorized script execution.









