Malicious Axios NPM Release Exposes Millions to Cross-Platform RAT in Major Supply Chain Breach
Attackers hijacked the Axios JavaScript library, pushing a remote access trojan to millions via NPM. The breach highlights escalating risks in open-source supply chains.

Attackers compromised the Axios NPM package—one of the most widely used JavaScript libraries—injecting a cross-platform remote access trojan (RAT) and exposing millions of applications and users to malware.
Axios, with over 30 million weekly downloads, is a foundational dependency for web and server-side projects. The breach, discovered in March 2026, underscores the systemic risk posed by supply chain attacks on open-source software. When a single, trusted library is compromised, the blast radius extends across the entire software ecosystem.
How the Attack Unfolded
According to reports from VentureBeat and Ars Technica, the attackers gained access to the Axios maintainer's NPM authentication token. This credential theft gave them legitimate publishing rights, allowing them to upload malicious versions of the package directly to the NPM registry.
The tainted releases—published in March 2026—delivered a sophisticated RAT capable of infecting Windows, macOS, and Linux systems. The malware leveraged code obfuscation and self-propagation tactics to evade detection and maximize its reach.
Scale of Exposure
- Axios weekly downloads (pre-attack): 30 million+
- Affected platforms: Windows, macOS, Linux
- Exposure window: Several days in March 2026 before discovery and removal
Given Axios’s near-ubiquity in JavaScript development, the number of potentially exposed applications and users is staggering. Any project updating dependencies during the exposure window risked pulling in the compromised codebase.
Malware Capabilities and Evasion
The injected RAT was engineered for stealth. Security researchers found that it used heavy obfuscation, making static analysis and signature-based detection difficult. The malware also included self-propagation logic, attempting to spread itself to other systems and developer environments via shared code and credentials.
“This is a textbook example of the cascading impact a single compromised open-source dependency can have,” said a security analyst cited by Ars Technica.
Some versions of the malware were observed wiping machines based in specific regions, further complicating incident response and attribution.
Response and Remediation
Once the compromise was detected, NPM maintainers and the Axios team moved quickly. The malicious packages were removed from the registry, and the stolen credentials were revoked. Security advisories were issued, urging developers to audit their dependencies and roll back to safe versions.
However, the incident highlights a persistent challenge: the lag between compromise, discovery, and remediation. For high-velocity projects with automated dependency updates, even a brief exposure can be catastrophic.
Broader Context: A Pattern of Supply Chain Attacks
This Axios breach is not an isolated event. It follows a string of high-profile supply chain attacks targeting NPM and other package repositories. Similar incidents have affected packages like event-stream, ua-parser-js, and even core tools in the Python and Ruby ecosystems.
The common thread: attackers exploit the trust model of open-source, targeting maintainers or exploiting lax credential hygiene to poison the well at the source. With open-source libraries underpinning everything from web apps to critical infrastructure, the stakes are only rising.
What’s Next: Hardening the Open-Source Supply Chain
The Axios incident is a wake-up call for both developers and platform operators. Expect renewed calls for:
- Mandatory multi-factor authentication (MFA) for package maintainers
- Automated malware scanning and anomaly detection on package repositories
- Greater transparency and attestation for dependency updates
- Stronger incident response playbooks for open-source communities
For now, the Axios breach is contained—but the underlying vulnerabilities in the open-source supply chain remain. With attackers increasingly targeting the software commons, the industry’s response in the coming months will set the tone for the next era of software security.
TopWire is reader-supported.
Pro members get extended analysis and weekly deep-dives — and keep independent tech journalism running. $8/month.