Malicious Axios NPM Update Exposes Millions to Cross-Platform RAT in Major Supply Chain Breach
Attackers compromised the Axios NPM package, exposing millions to a cross-platform RAT. The breach highlights persistent risks in open source supply chains.

Attackers compromised the Axios JavaScript library, injecting a cross-platform remote access trojan (RAT) into a package downloaded over 30 million times a week, in one of the most consequential open source supply chain breaches to date.
The malicious Axios update, published to the NPM registry after attackers obtained a maintainer's credentials, was live for several hours before detection and removal. In that brief window, thousands of developers unwittingly installed a package that could grant attackers full access to Windows, macOS, and Linux systems—potentially impacting both open source and commercial projects at global scale.
Why It Matters
Axios is not a niche library—it's a foundational dependency for thousands of projects, from hobbyist apps to enterprise SaaS. According to NPM data, Axios sees over 30 million weekly downloads, making it a core building block across the JavaScript ecosystem.
Supply chain attacks like this are increasingly common, but the Axios incident stands out for its speed, reach, and technical sophistication. The malware not only enabled remote access but also included self-propagating features and, in a targeted move, wiped machines located in Iran, according to forensic analysis (Ars Technica).
Attack Details
- Attack vector: Maintainer credential compromise led to malicious Axios versions on NPM.
- Payload: Cross-platform RAT with propagation and selective data-wiping capabilities.
- Exposure window: Several hours, resulting in thousands of downloads before removal.
- Targeted impact: Machines in Iran were specifically wiped, suggesting geopolitical intent.
The incident was detected and mitigated rapidly, but not before the damage was done. The compromised Axios package is now a case study in the persistent vulnerability of open source supply chains—where a single compromised credential can ripple through the global software stack in hours.
Context: A Pattern of Open Source Risk
This is not an isolated event. Recent years have seen a surge in supply chain attacks targeting open source repositories like NPM, PyPI, and RubyGems. High-profile cases—SolarWinds, event-stream, and now Axios—underscore the systemic risk: decentralized maintenance, minimal vetting, and the sheer scale of dependency trees make open source libraries irresistible targets.
Credential hygiene remains a glaring weak point. Attackers routinely exploit weak or reused passwords, phishing, or social engineering to gain access to maintainer accounts. Once inside, they can publish malicious updates that propagate instantly to millions of downstream users.
Automated threat detection and package vetting are improving, but the Axios breach shows the gap between theory and practice. Even a few hours of exposure can have outsized consequences when the target is a widely used dependency.
What This Means
For founders building in this space, the message is blunt: you can't afford to treat open source dependencies as trusted black boxes. Every dependency is a potential attack surface, and credential management is now a board-level concern. Expect increased scrutiny from customers and investors on your software supply chain hygiene—and be ready to show your work.
For the industry, this incident signals that open source supply chain risk is not theoretical—it's operational. The Axios breach will accelerate calls for mandatory 2FA, automated package scanning, and even regulatory oversight. The days of 'move fast and trust the registry' are over; expect slower, more cautious adoption of dependencies, and a new market for supply chain security tooling.
The non-obvious second-order effect: open source maintainers, already stretched thin, will face even more pressure and liability. We may see a chilling effect on volunteer maintainership, as the cost of a single mistake grows. This could drive further consolidation around a handful of 'blessed' libraries—ironically, increasing monoculture risk even as it aims to improve security.
The Other Side
TopWire is reader-supported.
Pro members get extended analysis and weekly deep-dives — and keep independent tech journalism running. $5/month.