SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
A widely used JavaScript library is at the center of a rapidly developing supply chain attack with potential for broad downstream impact.
On March 31, 2026, attackers compromised the official Axios package on the Node Package Manager (npm) registry. Axios is one of the most widely used open-source libraries for making web requests, with over 100 million downloads per week. It is embedded in web applications, mobile apps, backend services, and automated build pipelines across virtually every industry.
The attacker gained access to the Axios package maintainer’s publishing credentials and used them to release two poisoned versions of Axios (1.14.1 and 0.30.4) that included a hidden malicious dependency. When developers or automated systems install either version, the malicious code executes immediately, stealing sensitive credentials from the system (cloud access keys, database passwords, API tokens) and installing a Remote Access Trojan (RAT) that gives the attacker persistent access to the compromised machine.
“This is exactly the type of attack supply chain attack that we discussed at RSAC last week. One compromised maintainer account, and a package that touches millions of systems becomes a weapon.”
The malicious versions were live on NPM for approximately two to three hours before detection and removal. The attack targeted both the current and legacy branches of Axios simultaneously, maximizing exposure across the ecosystem.
Any developer, build system, or production environment that installed Axios during the exposure window is potentially compromised. This includes:
The malicious code targeted Windows, macOS, and Linux systems with platform-specific payloads, covering the full range of environments where Axios is used.
Affected package hashes for detection and forensic correlation2
Early analysis indicates that this attack may be a continuation of the TeamPCP supply chain campaign. Between March 19 and March 27, 2026, TeamPCP compromised four widely used open-source projects in rapid succession: the Trivy vulnerability scanner (March 19), the KICS infrastructure-as-code scanner (March 23), the LiteLLM AI proxy library on PyPI (March 24), and the Telnyx communications library on PyPI (March 27). 3 In each case, the malware harvested cloud credentials, SSH keys, Kubernetes configuration files, and CI/CD secrets. Wiz researchers observed TeamPCP validating stolen credentials within hours using TruffleHog, then conducting reconnaissance across AWS services including IAM, EC2, Lambda, S3, and Secrets Manager.
SANS analysts believe that TeamPCP likely has access to a stockpile of compromised publishing credentials and may be operating as an Initial Access Broker (IAB), selling access to other threat actors. If accurate, this pattern of supply chain compromises targeting high-download packages will continue over the coming weeks and months. Organizations should treat any credential exposed through these incidents as actively exploited.
This incident is a textbook example of the supply chain risks discussed at RSAC last week. A single compromised maintainer account turned one of the most trusted packages in the npm ecosystem into an attack vector. The attacker pre-staged the malicious dependency 18 hours before publishing the poisoned Axios versions, demonstrating operational planning designed to evade detection.
“The attack surface is your vendor’s vendor’s vendor. This is what that looks like in practice.”
Organizations that had lockfiles pinning Axios to a specific version, or CI/CD policies that suppress automatic install scripts, were protected. Organizations that did not had a window of exposure measured in hours, with consequences that may take weeks to fully assess.


Joshua Wright, Senior Technical Director at Counter Hack Challenges and author of SEC504, has spent over two decades teaching and building tools that help defenders identify and counter real-world cyber threats through practical, hands-on learning.
Read more about Joshua Wright