LevelBlue + SentinelOne: Global Partnership to Deliver AI-Powered Managed Security Operations and Incident Response. Learn More
Access immediate incident response support, available 24/7
Access immediate incident response support, available 24/7
LevelBlue + SentinelOne: Global Partnership to Deliver AI-Powered Managed Security Operations and Incident Response. Learn More
A supply chain compromise involving the Axios npm package has been identified within a customer’s environment. Earlier this month, news broke that threat actors successfully published malicious versions of the package to the npm repository after compromising the npm account of the company’s lead developer.
These malicious versions included a hidden dependency that executed automatically during the npm installation process via a postinstall script. This resulted in the downloading and execution of a secondary payload, ultimately deploying a RAT on affected systems.
Unlike traditional malware infections, this attack does not require user interaction beyond installing dependencies, making it particularly dangerous for developer systems and continuous integration/continuous delivery CI/CD pipelines where automated installations are common.
Proactive threat hunting has confirmed the presence of this activity across multiple machines in the environment.
The impact of this compromise is considered critical due to the nature of execution and access gained by the attacker.
Affected systems may have experienced:
At this stage, large-scale data exfiltration has not been conclusively confirmed; however, it cannot be ruled out. All affected systems should be treated as fully compromised.

Figure 1. Attack flow diagram related to Axios npm exploitation

Figure 2. Attack flow as observed in LevelBlue’s Cybereason EDR platform
The attack leverages a compromised trusted package to achieve initial access. By abusing npm’s lifecycle scripts, the threat actor ensures the automatic execution of malicious code during installation.
This technique is highly effective because it:
The short exposure window suggests a targeted or rapid exploitation attempt, likely relying on automated dependency updates and CI/CD processes.
This incident highlights weaknesses in software supply chain trust models, specifically:
The use of a typosquat-style or hidden dependency (plain-crypto-js) further indicates an attempt to evade detection and blend into legitimate package structures.
The following are what we observed as post-infection activities in affected systems:
This behavior strongly suggests that the initial compromise quickly transitions into full system access and control.
Immediate containment and remediation actions are required for infected systems:
|
Type |
Value |
Comment |
|
Sha256 |
e10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09 |
package/setup.js |
|
Sha256 |
617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101 |
6202033.ps1 |
|
IP |
142.11.206[.]73 |
C2 IP address |
|
Domain |
sfrclak[.]com |
C2 Domain |
|
URL |
http[:]//sfrclak[.]com[:]8000/6202033 |
URL used for C2 / payload server |
These indicators can be used for threat hunting purposes.
The LevelBlue Cybereason Defense Platform can detect and prevent Axios post-exploitations. LevelBlue recommends the following actions:
To detect if the Axios npm compromise has been exploited, run the following hunting query in the LevelBlue Cybereason Defense Platform.
We recommend running queries to look for Suspicious script execution:
1. Process Element -> add the filters “Process name is cscript.exe OR mshta.exe OR cmd.exe OR wscript.exe” and “Command line contains ’packages.npm’ OR ‘http:’ OR ‘https:’ and “Command line contains ‘AppData\Local\Temp\’

Query with Process element
We provided the following hunting query to obtain the same result:
https://[yourenvironment]/#/s/search?queryString=0<-Process"elementDisplayName:@cmd.exe%7Ccscript.exe%7Cmshta.exe%7Cwscript.exe,commandLine:@packages.npm%7Chttp:~%7Chttps:~,commandLine:@AppData%5CLocal%5CTemp%5C"
2. Process Element ->add the filters “Command line contains ‘6202033.ps1’ OR ’6202033.vbs’

Query with Process element
We provided the following hunting query to obtain the same result:
https://[yourenvironment]/#/s/search?queryString=0<-Process"commandLine:@6202033.ps1%7C6202033.vbs"
LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.