Executive Summary
The Axios compromise is a high-impact npm supply chain incident because malicious package versions delivered a cross-platform RAT via the injected plain-crypto-js dependency.
SEO-focused technical analysis of the Axios npm compromise, including malicious versions, the injected plain-crypto-js dependency, C2 infrastructure, hashes, and host-level hunting guidance.
The structured fields below are intended for technical responders, not just general readers.
The Axios compromise is a high-impact npm supply chain incident because malicious package versions delivered a cross-platform RAT via the injected plain-crypto-js dependency.
This incident combines popular package trust, maintainer compromise, cross-platform execution, and a second-stage retrieval model, which makes both direct package installs and transient CI/CD resolution events relevant to triage.
Node.js application builds, developer workstations, CI/CD pipelines, macOS, Windows, and Linux systems are all exposed if they resolved the malicious versions.
Mitigated, with extensive IOC coverage available for retro-hunts.
Locate installs of the malicious Axios and plain-crypto-js versions, review outbound traffic to the listed infrastructure, and search for the reported filesystem artifacts and hashes across macOS, Windows, and Linux endpoints.
Agent-authored technical narrative, preserving headings, lists, and code blocks.
The Axios compromise is especially serious because it paired a widely trusted package with a malicious dependency insertion that led to cross-platform remote-access behavior. This moved the incident beyond a simple typosquat and into maintainer-trust abuse with downstream malware delivery.
npm
axios@1.14.1
axios@0.30.4
plain-crypto-js@4.2.1
Known clean rollback targets
axios@1.14.0
axios@0.30.3
Verified.
plain-crypto-js dependency insertion.Why this matters: The malicious functionality was not described as a standalone adjacent package. It rode through a dependency relationship inside trusted Axios releases.
Verified.
/Library/Caches/com.apple.act.mond, %PROGRAMDATA%\\wt.exe, %TEMP%\\6202033.vbs, %TEMP%\\6202033.ps1, and /tmp/ld.py.Why this matters: Analysts need to hunt across endpoint platforms, not only in Node package inventories.
Verified.
sfrclak.com, callnrwise.com, 142.11.206.73, and the URL http://sfrclak.com:8000/6202033 as part of the malicious chain.Why this matters: Exposure includes both the package event and any follow-on network activity that occurred afterward.
plain-crypto-js dependency.The key mechanic is dependency insertion inside a trusted package release. Defenders do not just need to know that Axios was malicious; they need to know the malicious dependency name because caches, lockfiles, and mirrors may preserve it independently.
sfrclak.com
callnrwise.com
142.11.206.73
http://sfrclak.com:8000/6202033
/Library/Caches/com.apple.act.mond
%PROGRAMDATA%\wt.exe
%TEMP%\6202033.vbs
%TEMP%\6202033.ps1
/tmp/ld.py
e10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09
fcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf
2553649f2322049666871cea80a5d0d6adc700ca
d6f3f62fd3b9f5432f5782b62d8cfd5247d5ee71
07d889e2dadce6f3910dcbc253317d28ca61c766
The structure of the reporting indicates a second-stage retrieval model rather than a package that merely embeds a single static payload.
rg -n "axios@1.14.1|axios@0.30.4|plain-crypto-js@4.2.1" package-lock.json pnpm-lock.yaml yarn.lock
rg -n "sfrclak.com|callnrwise.com|142.11.206.73|/Library/Caches/com.apple.act.mond|%PROGRAMDATA%\\wt.exe|%TEMP%\\6202033.vbs|%TEMP%\\6202033.ps1|/tmp/ld.py" /var/log "$WORKSPACE"
Analyst focus:
Affected package coordinates and indicators are grouped once for hunting, detections, and review.
axios@1.14.1
axios@0.30.4
plain-crypto-js@4.2.1 axios@1.14.1
axios@0.30.4
plain-crypto-js@4.2.1 axios@1.14.1
axios@0.30.4
plain-crypto-js@4.2.1 axios@1.14.1
axios@0.30.4
plain-crypto-js@4.2.1 callnrwise.com
sfrclak.com 142.11.206.73 %PROGRAMDATA%\\wt.exe
%PROGRAMDATA%\wt.exe
%TEMP%\6202033.ps1
%TEMP%\6202033.vbs
%TEMP%\\6202033.ps1
%TEMP%\\6202033.vbs
/Library/Caches/com.apple.act.mond
/tmp/ld.py packages.npm.org/product0
packages.npm.org/product1
packages.npm.org/product2 07d889e2dadce6f3910dcbc253317d28ca61c766
2553649f2322049666871cea80a5d0d6adc700ca
d6f3f62fd3b9f5432f5782b62d8cfd5247d5ee71 617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101
e10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09
ed8560c1ac7ceb6983ba995124d5917dc1a00288912387a6389296637d5f815c
f7d335205b8d7b20208fb3ef93ee6dc817905dc3ae0c10a0b164f4e7d07121cd
fcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf http://sfrclak.com:8000/6202033 Detection logic is rendered as code so technical users can lift it directly into their own tooling.
rg -n "sfrclak.com|callnrwise.com|142.11.206.73|/Library/Caches/com.apple.act.mond|%PROGRAMDATA%\\wt.exe|%TEMP%\\6202033.vbs|%TEMP%\\6202033.ps1|/tmp/ld.py" /var/log "$WORKSPACE" rg -n "axios@1.14.1|axios@0.30.4|plain-crypto-js@4.2.1" package-lock.json pnpm-lock.yaml yarn.lock A concise event chronology helps responders anchor first-seen and disclosure timing.
Malicious Axios versions and the injected plain-crypto-js dependency were identified in public reporting.
Microsoft and Trend Micro published technical details, hashes, infrastructure, and cross-platform artifact paths.
Primary references are kept visible so analysts can trace the underlying reporting quickly.
Primary vendor analysis of the compromised Axios versions and dependency insertion behavior.
Trend Micro - Axios IOCs PDF Apr 1, 2026, 12:00 AMIOC companion sheet with hashes, package identifiers, infrastructure, and host artifacts.