Beyond the Radar: Join GigaOm and Cynet May 6th
Why Cynet
Our Valued Partners
Industry Validation
Platform
Solutions
Prevent, detect, and remediate threats automatically.
Detect and isolate suspicious traffic instantly.
Identify misconfigurations and risks before attackers do.
Block phishing and malicious attachments.
Extend protection to every device.
Stop credential theft and lateral movement.
Pre-built playbooks and automated workflows that reduce manual effort.
Partners
Resources
Resource Center
Company
Why Cynet
Our Valued Partners
Industry Validation
Platform
Solutions
Prevent, detect, and remediate threats automatically.
Detect and isolate suspicious traffic instantly.
Identify misconfigurations and risks before attackers do.
Block phishing and malicious attachments.
Extend protection to every device.
Stop credential theft and lateral movement.
Pre-built playbooks and automated workflows that reduce manual effort.
Partners
Resources
Resource Center
Company
Subscribe to get the latest updates and resources
Supply chain attacks are nothing new. Last year we saw how the evolution of Shai-Hulud led to two instances of major 3rd party packages being compromised and used to distribute malicious worms that would exfiltrate API keys, GitHub Personal Access Tokens (PATs), and other sensitive information. https://pentest-staging.cynet.com/blog/cyops-incident-trends-shai-hulud-npm-supply-chain-attack/
Today we’re seeing another attack targeting the popular NPM package “Axios”. Axios is a promise-based HTTP client for node.js and browsers. During the attack the malicious actors were able to hijack a maintainer account and publish two malicious versions of the package, “axios@1.14.1” and “axios@0.30.4”.

Importantly, after a comprehensive internal investigation, Cynet confirms that none of our infrastructure, products, or services are impacted. No compromised packages are present in our environments, and our customers remain fully protected.
In this article, we hope to share details of the attack so actionable steps can be taken to mitigate the risks associated with these attacks.
On March 31st, 2026, Cynet first detected and prevented the deployment of malicious files during the installation of the “plain-crypto-js” dependency in legitimate “Axios” packages.
This code is never explicitly declared used in the Axios project itself, but rather installed during the update of the project’s packages. By leveraging the NPM update/install process rather than injecting itself into the Axios codebase itself, the attackers deployed their malicious commands and files without disrupting the Axios program and functionality.
The distribution of the malware starts with NPMs automatic update process, from there node.exe will spawn multiple process, including a PowerShell instance to determine the file path and script instance to run a malicious VBS script “6202033.vbs”. This node instance will also write multiple suspicious files to disk, and copy a legitimate Powershell.exe to “c:\programdata\wt.exe”.
Once the VBS executes it reaches out to “http[://]sfrclak[.]com:8000/6202033” to download “6202033.ps1” and execute it with the created wt.exe mentioned before.
The malicious process then goes on to clean itself up, deleting it’s “plain-crypto-js” directory and other payload droppers in an effort to avoid detection.
These types of supply-chain attacks are here to stay. By hijacking maintainer accounts for popular third-party projects, attackers gain immediate, high-trust access to countless downstream environments. To mitigate or reduce the risk, organizations must prioritize rigorous code reviews, automated dependency scanning, and the practice of locking dependencies to verified, ‘known good’ versions.
Following a thorough internal investigation, we can confirm that Cynet’s infrastructure, products, and services are not affected by this incident. None of the compromised packages are used in our environments, and no Cynet-managed assets or endpoints have been exposed to the malicious components associated with this campaign.
We continue to monitor the situation closely and are following developments across the security community to ensure our defenses remain aligned with the latest threat intelligence.
Cynet remains committed to transparency, proactive protection, and delivering the highest level of security assurance to our customers.
Search results for: