Threat Brief: Widespread Impact of the Axios Supply Chain Attack

Summary: Unit 42 of Palo Alto Networks has uncovered a supply chain attack that affected versions of the widely used Axios HTTP client library, causing an impact across multiple sectors.

Unit 42's brief on Axios expands the scope of the incident, situating it as a campaign with a potentially much broader impact than a simple manipulation in npm. Compromised versions introduced a hidden dependency, plain-crypto-js@4.2.1, capable of deploying a cross-platform trojan with reconnaissance, persistence, and evasion functions.

The case's relevance lies in Axios' position within the development ecosystem. It is a basic library for HTTP requests, present in countless frontend, backend, and internal pipeline projects. Thus, a malicious publication does not affect only a small group of users but can extend exposure to multiple sectors, geographies, and integration chains.

Unit 42 adds an especially sensitive angle: the malware's association with operations previously linked to North Korea. That connection raises the strategic interest of the incident and moves it away from the reading of

Key facts

  • Unit 42 identified a supply chain attack that affected versions of the widely used Axios HTTP client library.
  • Compromised versions (v1.14.1 and v0.30.4) introduced a hidden dependency called plain-crypto-js@4.2.1.
  • This cross-platform remote access trojan can affect Windows, macOS, and Linux systems.
  • The malware is linked to operations previously attributed to North Korea.

Why it matters

The impact of this attack highlighted the vulnerability of supply chains, affecting multiple economic sectors and revealing the need to improve security practices in managing third-party libraries.