<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Axios-NPM-Compromise on Detection.FYI</title>
    <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/</link>
    <description>Recent content in Axios-NPM-Compromise on Detection.FYI</description>
    <generator>Hugo -- gohugo.io</generator>
    <copyright> </copyright>
    <lastBuildDate>Wed, 01 Apr 2026 10:31:31 +0000</lastBuildDate><atom:link href="https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Axios NPM Compromise File Creation Indicators - Linux</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/file_event_lnx_axios_npm_compromise_indicators/</link>
      <pubDate>Wed, 01 Apr 2026 10:31:31 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/file_event_lnx_axios_npm_compromise_indicators/</guid>
      <description>
        
          
            Detects file creation events linked to the Axios NPM supply chain compromise. Axios is a popular JavaScript HTTP client.
On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Axios NPM Compromise File Creation Indicators - MacOS</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/file_event_macos_axios_npm_compromise_indicators/</link>
      <pubDate>Wed, 01 Apr 2026 10:31:31 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/file_event_macos_axios_npm_compromise_indicators/</guid>
      <description>
        
          
            Detects file creation events linked to the Axios NPM supply chain compromise on macOS devices. Axios is a popular JavaScript HTTP client.
On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Axios NPM Compromise File Creation Indicators - Windows</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/file_event_win_axios_npm_compromise_indicators/</link>
      <pubDate>Wed, 01 Apr 2026 10:31:31 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/file_event_win_axios_npm_compromise_indicators/</guid>
      <description>
        
          
            Detects file creation events linked to the Axios NPM supply chain compromise. Axios is a popular JavaScript HTTP client.
On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper.
The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection.
The attack used cscript.exe (VBScript), curl.exe (C2), and PowerShell masquerading as Windows Terminal.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Axios NPM Compromise Indicators - Linux</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/proc_creation_lnx_axios_npm_compromise_indicators/</link>
      <pubDate>Wed, 01 Apr 2026 10:31:31 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/proc_creation_lnx_axios_npm_compromise_indicators/</guid>
      <description>
        
          
            Detects the Linux-specific execution chain of the plain-crypto-js malicious npm dependency by Axios NPM package, including payload download via curl and detached execution using nohup and python3.
On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper.
The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Axios NPM Compromise Indicators - macOS</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/proc_creation_macos_axios_npm_compromise_indicators/</link>
      <pubDate>Wed, 01 Apr 2026 10:31:31 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/proc_creation_macos_axios_npm_compromise_indicators/</guid>
      <description>
        
          
            Detects the macOS-specific execution chain of the plain-crypto-js malicious npm dependency in Axios NPM Package, including AppleScript execution via osascript, payload download, permission modification, execution, and cleanup.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Axios NPM Compromise Indicators - Windows</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/proc_creation_win_axios_npm_compromise_indicators/</link>
      <pubDate>Wed, 01 Apr 2026 10:31:31 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/proc_creation_win_axios_npm_compromise_indicators/</guid>
      <description>
        
          
            Detects the specific Windows execution chain and process tree associated with the Axios NPM supply chain compromise.
On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper.
The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection.
The attack used cscript.exe (VBScript), curl.exe (C2), and PowerShell masquerading as Windows Terminal.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Axios NPM Compromise Malicious C2 Domain DNS Query</title>
      <link>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/net_dns_axios_npm_compromise_indicator/</link>
      <pubDate>Wed, 01 Apr 2026 10:31:31 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/emerging-threats/2026/malware/axios-npm-compromise/net_dns_axios_npm_compromise_indicator/</guid>
      <description>
        
          
            Detects DNS queries for the malicious C2 domain associated with the plain-crypto-js/Axios npm package supply chain compromise.
On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper.
This detection detects endpoints attempting to resolve the attacker&#39;s C2 domain (sfrclak.com) used for command and control communication.

          
          
        
      </description>
    </item>
    
  </channel>
</rss>
