Axois NPM Supply Chain Incident
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要快速浏览文章内容,抓住主要信息。 文章讲的是Cisco Talos正在调查一起针对Axios npm包的供应链攻击,发生在2026年3月31日。Axios是一个非常流行的JavaScript库,每周下载量高达1亿次。攻击者发布了两个恶意版本,v1.14.1和v0.30.4,这两个版本只存在了大约三个小时。 恶意包引入了一个假的运行时依赖项plain-crypto-js,在安装后会自动执行。它会连接到攻击者控制的基础设施,下载针对不同操作系统的恶意负载。例如,在MacOS上下载并运行一个二进制文件,在Windows上执行一个PowerShell脚本,在Linux上则是一个Python后门。这些负载都是远程访问木马(RAT),允许攻击者收集信息并执行更多恶意活动。 影响方面,攻击可能导致凭证泄露和远程管理权限。因此,Talos建议受影响的组织立即回滚到安全版本,并调查可能的后续攻击。此外,他们还提供了多个指标来识别潜在的妥协。 总结的时候需要涵盖:事件名称、时间、受影响软件、恶意版本、持续时间、引入的依赖项、连接的基础设施、不同系统的负载类型、影响以及建议措施。同时要确保在100字以内简洁明了地表达出来。 </think> Cisco Talos正在调查一起针对Axios npm包的供应链攻击事件,该事件于2026年3月31日发生,涉及两个恶意版本(v1.14.1和v0.30.4)。这些版本引入了一个虚假依赖项,并连接到攻击者控制的基础设施以分发针对Linux、MacOS和Windows的恶意负载。Talos建议受影响用户回滚到安全版本,并调查潜在后续攻击。 2026-4-3 17:3:30 Author: blog.talosintelligence.com(查看原文) 阅读量:4 收藏

Cisco Talos is actively investigating the March 31, 2026 supply chain attack on the official Axios node package manager (npm) package during which two malicious versions (v1.14.1 and v0.30.4) were deployed. Axios is one of the more popular JavaScript libraries with as many as 100 million downloads per week.

Axios is a widely-deployed HTTP client library for JavaScript that simplifies HTTP requests, specifically for REST endpoints. The malicious packages were only available for approximately three hours, but if downloaded Talos strongly encourages that all deployments should be rolled back to previous known safe versions (v1.14.0 or v0.30.3). Additionally, Talos strongly recommends users and administrators investigate any systems that downloaded the malicious package for follow-on payloads from actor-controlled infrastructure.

Details of supply chain attack

The primary modification of the packages introduced a fake runtime dependency (plain-crypto-js) that executes via post-install without any user interaction required. Upon execution, the dependency reaches out to actor-controlled infrastructure (142[.]11[.]206[.]73) with operating system information to deliver a platform-specific payload to Linux, MacOS, or Windows.

On MacOS, a binary, “com.apple.act.mond”, is downloaded and run using zsh. Windows is delivered a ps1 file, which copies the legitimate powershell executable to “%PROGRAM DATA%\wt.exe”, and executes the downloaded ps1 file with hidden and execution policy bypass flags. On Linux, a Python backdoor is downloaded and executed. The payload is a remote access trojan (RAT) with typical associated capabilities allowing the actor to gather information and run additional payloads.

Impact

As with most supply chain attacks, the full impact will likely take some time to uncover. The threat actors exfiltrated credentials along with remote management capabilities. Therefore, Talos strongly recommends organizations treat any credentials present on their systems with the malicious package as compromised and begin the process of rotating them as quickly as possible. Actors are likely to try to weaponize access as quickly as possible to maximize financial gain.

Supply chain attacks tend to have unexpected downstream impacts, as these packages are widely used across a variety of applications, and the compromised credentials can be leveraged in follow-on attacks. For additional context, about 25% of the top 100 vulnerabilities in the Cisco Talos 2025 Year in Review affect widely used frameworks and libraries, highlighting the risk of supply chain-style attacks.

Talos will continue to monitor any follow-on impacts from this supply chain attack in the days and weeks ahead, as well as any additional indicators that are uncovered as a result of our ongoing investigation.

Indicators of Compromise (IoCs)

IP Address:
142[.]11[.]206[.]73

Domains:
Sfrclak[.]com

SHA256
e10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09 (setup[.]js)
fcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf (Linux)
617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101 (Windows)
92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a (MacOS)
ed8560c1ac7ceb6983ba995124d5917dc1a00288912387a6389296637d5f815c (6202033.ps1)


文章来源: https://blog.talosintelligence.com/axois-npm-supply-chain-incident/
如有侵权请联系:admin#unsafe.sh