Security alert: thus a deceptive npm dependence compromised Axios and left a multi-platform RAT

Published 5 min de lectura 114 reading

The JavaScript community woke up with news that brings back to the fore a risk that many developers fear: software supply chains. The popular HTTP Axios client, with tens of millions of weekly downloads, was the subject of a malicious npm publication that introduced a trap unit called plain-crypto-js @ 4.2.1, designed exclusively to run a posterior installer (postinstall) that drops a multi-platform remote access trojan (RAT).

According to the technical analysis it has transcended, the attack did not change the Axio code itself, but took advantage of committed credentials from the main maintainer of the project to publish contaminated versions (in the majority branches published as 1.14.1 and 0.30.4). When injecting an apparently harmless unit, it was possible to run malicious code at the time of installation, without altering the Axios lines that developers usually review.

Security alert: thus a deceptive npm dependence compromised Axios and left a multi-platform RAT
Image generated with IA.

The mechanism used by the attackers was direct and sophisticated: the malicious dependence included a post-install osfuscado script (a "dropper" on Node.js) that, depending on the operating system, downloaded and launched a second stage specific to macOS, Windows or Linux. MacOS describes actions using AppleScript to download and run a binary; Windows would take advantage of PowerShell and VBScript to launch a RAT; and Linux's chain ended up running a Python script from / tmp. After the execution, malware was trying to clear its tracks and replace the package manifesto with a "clean" version to make it difficult for forensic detection.

This attack also shows a careful use of temporary logistics: the lure bookstore was published with a "clean" version hours before the payload version was uploaded to the record, and the two branches of Axios were contaminated within minutes, suggesting that the attackers prepared and tested artifacts in advance. The actor also modified npm account metadata and, according to the technical report, is likely to use a long-term classic access token to publish directly in the register.

For projects and teams that depend on Axios, the immediate recommendations are clear. If one of the affected versions is detected, it is appropriate to consider the installation of a known and secure previous version and to assume the possibility of commitment if the machine that installed the unit has not been inspected. Rotating secrets and credentials immediately is the prudent measure if there is exposure to contaminated versions. In addition, check typical RAT artifacts (time routes and files that the dropper leaves according to platform) and audit the CI / CD executions that may have installed these versions are essential steps.

The nature of the incident again highlights two important lessons for software security: on the one hand, the tokens and credentials that allow to publish packages must be of short duration or managed by safer mechanisms, and on the other, the "venorized" units or included in model node trees may hide dangerous modifications that the code review process does not detect. Specialized supply chain security organizations have shown how packages apparently not imported by the main bookstore can be sufficient to compromise environments as soon as npm install is run.

In addition to Axios, third-party analysis detected packages that incorporated the same malicious dependence on sold routes and others that directly included a manipulated version of Axios within their own mode node, which multiplies the field of exposure. This shows that attackers can spread their payload by both publishing new packages and adulterating trees from existing dependencies.

For those who want to deepen the overall phenomenon and recommendations to mitigate attacks on the supply chain, it is useful to consult analyses and guides of entities that often address this problem. The official Axios repository and the npm package page are references to check published versions and metadata: https: / / github.com / axios / axios and https: / / www.npmjs.com / package / axios. For technical context and good practices on supply chain security, resources such as the npm blog and publications of specialized companies provide useful guides: https: / / blog.npmjs.org and https: / / snyk.io / blog /. It is also recommended to review the documentation and notices of authorities on incident management and the rotation of credentials, such as the materials of the Security and Cybersecurity Agency (CISA): https: / / www.cisa.gov.

Security alert: thus a deceptive npm dependence compromised Axios and left a multi-platform RAT
Image generated with IA.

From a practical perspective, organizations should combine reactive and preventive measures. Reactively, audit systems to detect any of the engagement indicators associated with dropper - for example temporary files, residual binary files or changes in package manifests - and assume the worst hypothesis until all potentially compromised credentials have been renewed. Preventively, limiting tokens with minimum permits, enabling more rigid publication controls, reviewing CI / CD policies to avoid high-privilege credentials executions and using solutions that monitor the integrity of the units help reduce the attack surface.

It is important to stress that incidents such as this do not involve fraud in the source code audited by millions, but that they show that publication points and access management are critical vectors. The safety of the npm ecosystem depends not only on reviewing bookstores, but also on protecting the accounts and flows that allow publishing and distributing software.

The news forces you to rethink routines: to audit dependencies, to harden tokens, to monitor automatic pipeline facilities and to teach teams to react quickly to the possibility of a supply chain commitment. To be kept informed of the particular case and the technical analyses that cause it, it is appropriate to follow the security publications and updates in the official repositories where warnings and patches will be incorporated.

Coverage

Related

More news on the same subject.