Axios NPM Compromise Indicators - Windows
Detects the specific Windows execution chain and process tree associated with the Axios NPM supply chain compromise. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection. The attack used cscript.exe (VBScript), curl.exe (C2), and PowerShell masquerading as Windows Terminal.
Sigma rule (View on GitHub)
1title: Axios NPM Compromise Indicators - Windows
2id: f6c27ecc-d890-4452-80e6-2e274a10e097
3status: experimental
4description: |
5 Detects the specific Windows execution chain and process tree associated with the Axios NPM supply chain compromise.
6 On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper.
7 The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection.
8 The attack used cscript.exe (VBScript), curl.exe (C2), and PowerShell masquerading as Windows Terminal.
9references:
10 - https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan
11 - https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html?m=1
12 - https://www.derp.ca/research/axios-npm-supply-chain-rat/
13 - https://www.elastic.co/security-labs/axios-supply-chain-compromise-detections
14 - https://www.virustotal.com/gui/file/e10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09
15author: Swachchhanda Shrawan Poudel (Nextron Systems)
16date: 2026-04-01
17tags:
18 - attack.initial-access
19 - attack.t1195.002
20 - attack.execution
21 - attack.command-and-control
22 - attack.defense-evasion
23 - attack.t1059.003
24 - attack.t1059.005
25 - attack.t1105
26 - detection.emerging-threats
27logsource:
28 category: process_creation
29 product: windows
30detection:
31 selection_cscript:
32 ParentImage|endswith:
33 - '\node.exe'
34 - '\bun.exe'
35 Image|endswith: '\cmd.exe'
36 CommandLine|contains|all:
37 - 'cscript'
38 - 'AppData\Local\Temp'
39 - '//nologo && del'
40 - '6202033.vbs'
41 selection_curl:
42 Image|endswith:
43 - '\curl.exe'
44 - '\powershell.exe'
45 CommandLine|contains: 'http://sfrclak.com'
46 selection_susp_cli:
47 OriginalFileName: 'PowerShell.EXE'
48 CommandLine|contains: '"C:\ProgramData\wt.exe" -w hidden -ep bypass -file'
49 condition: 1 of selection_*
50falsepositives:
51 - Highly unlikely
52level: high
References
Related rules
- Axios NPM Compromise Indicators - Linux
- Axios NPM Compromise Indicators - macOS
- Potential Pikabot Infection - Suspicious Command Combinations Via Cmd.EXE
- Axios NPM Compromise File Creation Indicators - Linux
- Axios NPM Compromise File Creation Indicators - MacOS