Close Menu
  • Home
  • Psychology
  • Dating
    • Relationship
  • Spirituality
    • Manifestation
  • Health
    • Fitness
  • Lifestyle
  • Family
  • Food
  • Travel
  • More
    • Business
    • Education
    • Technology
What's Hot

The Epstein Files and the Failure of Sex Education

April 2, 2026

Hackers slipped a trojan into the code library behind most of the internet. Your team is probably affected

April 2, 2026

Avora Residences Launches “Continuum,” Introducing a New Private Membership Club at Sea | News

April 2, 2026
Facebook X (Twitter) Pinterest YouTube
Facebook X (Twitter) Pinterest YouTube
Mind Fortunes
Subscribe
  • Home
  • Psychology
  • Dating
    • Relationship
  • Spirituality
    • Manifestation
  • Health
    • Fitness
  • Lifestyle
  • Family
  • Food
  • Travel
  • More
    • Business
    • Education
    • Technology
Mind Fortunes
Home»Technology»Hackers slipped a trojan into the code library behind most of the internet. Your team is probably affected
Technology

Hackers slipped a trojan into the code library behind most of the internet. Your team is probably affected

April 2, 2026No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
Hackers slipped a trojan into the code library behind most of the internet. Your team is probably affected
Share
Facebook Twitter LinkedIn Pinterest Email

Attackers have successfully stolen a long-standing npm access token that belonged to the lead maintainer of axios, the most widely used HTTP client library in JavaScript. This stolen token was then utilized to publish two corrupted versions of axios that install a cross-platform remote access trojan. These malicious releases were designed to target macOS, Windows, and Linux systems and were available on the npm registry for roughly three hours before being removed.

Axios, which receives over 100 million downloads per week, is a crucial component in approximately 80% of cloud and code environments. This includes everything from React front-ends to CI/CD pipelines to serverless functions. Huntress, a security company, detected the initial infections within 89 seconds of the malicious package going live, with at least 135 compromised systems among its customers during the exposure period.

This incident marks the third major npm supply chain compromise in the past seven months, all of which exploited maintainer credentials. Despite having implemented various security measures recommended by the security community, axios fell victim to this attack.

The attacker gained control of the npm account belonging to @jasonsaayman, a lead axios maintainer, by changing the account email to an anonymous ProtonMail address. The attacker then published the corrupted packages through npm’s command-line interface, bypassing the project’s GitHub Actions CI/CD pipeline entirely. The malicious releases did not alter the Axios source code but added a single new dependency, plain-crypto-js@4.2.1, to both release branches. This dependency was solely designed to execute a postinstall script that installs a cross-platform RAT on the developer’s machine.

The attack was meticulously planned, with the attacker first publishing a clean version of plain-crypto-js under a separate npm account to avoid detection. The weaponized 4.2.1 version was then released within 39 minutes, with pre-built payloads for three different platforms. The malware was programmed to erase itself after execution and replace the package.json file to hinder forensic examination.

See also  £30 Google Pixel 9 Upgrade Transformed How I Use My Phone

The security community praised Axios for adopting various security measures, such as shipping legitimate releases through GitHub Actions using npm’s OIDC Trusted Publisher mechanism and carrying SLSA provenance attestations. However, the attacker managed to bypass these defenses by exploiting a legacy token that coexisted alongside OIDC, which npm silently preferred for authentication during publishing.

Despite the security enhancements implemented after previous supply chain compromises, the incident highlights the recurring theme of credential compromise as the primary vulnerability in such attacks. Until the root cause of maintaining individual maintainer accounts as the ultimate trust anchor is addressed, the risk of credential hijacking will persist.

In response to this incident, SOC leaders are advised to conduct impact assessments to identify affected systems, contain the breach, patch vulnerabilities, and implement transparent reporting to prevent future incidents. It is crucial for organizations running Node.js to check for exposure to the compromised package, assume compromise if affected, block command and control servers, check for RAT artifacts on machines, and enforce stricter security measures in their CI/CD pipelines.

As the npm ecosystem continues to evolve, it is essential for maintainers to stay vigilant and implement robust security measures to protect against supply chain attacks. By addressing the root cause of credential vulnerabilities and adopting best practices in authentication and authorization, npm packages can enhance their security posture and mitigate the risk of future compromises.

affected Code hackers internet library slipped team trojan
Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
Previous ArticleAvora Residences Launches “Continuum,” Introducing a New Private Membership Club at Sea | News
Next Article The Epstein Files and the Failure of Sex Education

Related Posts

Sky TV: 3 thriller series I can’t wait to see

April 2, 2026

Pixelsnap Charger Enables Manual Updates for Non-Pixel Users

April 1, 2026

Comprehensive Guide to Predictive Analytics in Retail

April 1, 2026

Mercor says it was hit by cyberattack tied to compromise of open-source LiteLLM project

April 1, 2026
Leave A Reply Cancel Reply

Our Picks

NBCU Academy’s The Edit | Teacher Picks

March 7, 2026

AI Learning Assistant | Teacher Picks

March 29, 2026

What SEL Skills Do High School Graduates Need Most? Report Lists Top Picks

March 8, 2026
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Don't Miss
Psychology

The Epstein Files and the Failure of Sex Education

April 2, 20260

Growing up on a farm provides a unique education on reproduction, as observing animals mating…

Hackers slipped a trojan into the code library behind most of the internet. Your team is probably affected

April 2, 2026

Avora Residences Launches “Continuum,” Introducing a New Private Membership Club at Sea | News

April 2, 2026

How Ready-to-Read Books Help Teachers Reach K–3 Readers

April 2, 2026
About Us
About Us

Explore blogs on mind, spirituality, health, and travel. Find balance, wellness tips, inner peace, and inspiring journeys to nurture your body, mind, and soul.

We're accepting new partnerships right now.

Our Picks

The Epstein Files and the Failure of Sex Education

April 2, 2026

Hackers slipped a trojan into the code library behind most of the internet. Your team is probably affected

April 2, 2026

Avora Residences Launches “Continuum,” Introducing a New Private Membership Club at Sea | News

April 2, 2026

Subscribe to Updates

Awaken Your Mind, Nourish Your Soul — Join Our Journey Today!

Facebook X (Twitter) Pinterest YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 mindfortunes.org - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.