Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportBlogContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    axios npm Compromise: The Ultimate Supply Chain Scaries
    Huntress Cybersecurity
    axios npm Compromise: The Ultimate Supply Chain Scaries
    Huntress Cybersecurity
    Nightmare-Eclipse Tooling Moves From Public PoC to Real-World Intrusion
    Huntress Cybersecurity
    Nightmare-Eclipse Tooling Moves From Public PoC to Real-World Intrusion
    Huntress Cybersecurity
    Threat Advisory: Uptick in Bomgar RMM Exploitation
    Huntress Cybersecurity
    Threat Advisory: Uptick in Bomgar RMM Exploitation
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Blog
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportBlogContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
axios npm Compromise: The Ultimate Supply Chain Scaries
Published:
April 21, 2026

axios npm Compromise: The Ultimate Supply Chain Scaries

By:
Lindsey O'Donnell-Welch
Share icon
Glitch effectGlitch effectGlitch effect

The axios npm supply chain compromise in March came to light as many security incidents do: a post on X in the middle of a Monday night. 

“Need someone from npmjs security team to dm me NOW,” tweeted Elastic’s tech lead Joe Desimone.

need someone from npmjs security team to dm me NOW

— Joe Desimone (@dez_) March 31, 2026

The urgency of the message was warranted. As it turned out, a major supply chain compromise had hit the axios npm package, one of the most widely used JavaScript libraries (think 100 million weekly downloads). 

The two compromised versions ([email protected] and [email protected]) were removed within three hours, but this window was still enough to impact many organizations that were dependent on the package (Huntress alone observed at least 135 endpoints across all operating systems contacting the attacker's command-and-control infrastructure during the exposure window). Attackers were able to deliver malware to macOS, Windows, and Linux systems through the malicious dependency that had been injected into the backdoored axios releases. 

In the hours that followed, security researchers – including Huntress’ own John Hammond – unraveled the widespread attack in the best way they knew how – tracking indicators of compromise (IoCs) across incidents, creating detections, and piecing together attackers’ tradecraft to figure out how victim organizations had been impacted. 

Two weeks later, at Huntress’ April Tradecraft Tuesday on April 14, Hammond (senior principal security researcher) was joined by three others who played their own parts in piecing together this massive attack, and the broader risks tied to supply chain security threats overall: Ben Read, director of strategic intelligence with Wiz, Charlie Eriksen, security researcher with Aikido Security, and Logan MacLaren, staff offensive security engineer with Huntress. 


A quick TL;DR into the incident

So what happened? In case you didn’t see the news headlines the entire week of March 30, here’s a quick breakdown. 

Let’s start with the very basics: npm (short for Node Package Manager) is a software component library for the JavaScript ecosystem. At the most basic level, npm is the tool that lets developers “borrow” pre-written code for their applications. 

This is all well and good for developers who don’t want to write their apps from the ground up, but over time it has created a massive ecosystem of packages depending on even more packages - sometimes even five or six layers deep. This sets the stage for a very dangerous “blast radius” if someone is able to upload a malicious package, which is then pushed to these other downstream dependencies.


Figure 1: A Huntress Rapid Response blog broke down a timeline of the attack 

That’s exactly what happened when a threat actor gained access to the jasonsaayman npm account (the primary maintainer of the axios library). From there, attackers manually published the two backdoored releases.  For the countless packages, developer workstations, and CI/CD pipelines that depended on axios and ran npm install during this three-hour timeframe, it meant that the malicious payload was executed. Automatically. 

Various researchers have pointed to links in the attack to DPRK infrastructure, with Google attributing the incident specifically to UNC1069, a financially motivated North Korean threat actor active since at least 2018. The malicious payload in the attack was a RAT with cross-platform payload capabilities, which allowed for system reconnaissance, credential harvesting, and remote command execution. This in itself was notable, as historically npm supply chain attacks frequently led to cryptocurrency mining malware.


Hunting season for the bad guys

Supply chain compromises in the open source ecosystem are not new by any means, but we’ve seen an inflection point over the past year involving several massive attacks specifically hitting npm accounts. On top of all this, LLMs are making attacks more seamless by enabling threat actors to more easily mix and match their techniques. 

Some examples have stood out in particular: 

  • In September 2025, Josh Junon (a developer known as “qix”)  was targeted by a phishing email that hit his npm account, which in turn led to the compromise of 18 very popular npm packages. In that case, the piece of code shipped out to the packages was targeting crypto transactions on various blockchains. 
  • Also in September 2025, a self-replicating worm called Shai-Hulud tore through the npm ecosystem. The malware’s credential harvesting capabilities raised eyebrows, because this then meant that attackers could potentially use the stolen credentials to infect further packages.
  • In March 2026, TeamPCP compromised Aqua Security’s popular open-source Trivy vulnerability scanner, which then led to several downstream attacks (and later spreading to the npm ecosystem with a worm that used stolen publish tokens). 

Shai-Hulud in particular used techniques that can only be described as “chaotic evil.” The malware first checked for GitHub tokens in victim environments, and then would use that token to upload whatever secrets they found on the machine on GitHub – unencrypted. 

As Aikido Security’s Eriksen said, if you’re a threat actor using this tactic, “you want to see the world burn.”


I think what's really interesting about Shaihulud, right, is that there was three different waves and they all had some very interesting and novel techniques from my perspective. But what really sets it apart to me is what they were doing when they compromised somebody. What they did was that they would check if you had a GitHub token, at least in the first version, they would check if you had a GitHub token in your environment. And then what they would do is that they would use that token to whatever secrets they found on machine to upload those unencrypted onto GitHub for anybody to see. Right? This is what I would call like chaotic evil. Right? This is just you wanna see the world burn. You didn't even bother putting like asymmetric encryption. Like we have seen other threat actors use recently. And that becomes really problematic because now attribution becomes impossible. And that became relevant around New Year's Eve when this crypto thing called Trust Wallet got compromised. We believe again through Shaikhulut. And it means that we cannot attribute who did it because everybody had that secret. So that is is one of the



The trust problem 

At the end of the day, open source security challenges come down to trust. Attackers rely on trust by using social engineering techniques to target maintainers before compromising their accounts. This is the new normal – and it was on full display during the axios npm attack:

  • axios maintainer Jason Saayman said in a post-mortem report that the actors behind the incident approached him pretending to be the founder of a company
  • They then sent an invite to a fake Slack workspace, which was appropriately branded, and included realistic channels, team members and posts. 
  • They then invited Saayman to a scheduled Microsoft Teams call, which had “what seemed to be a group of people that were involved.” 
  • While on the call, the threat actor said something on Saayman’s system was out of date and prompted him to install an item to fix the issue – a ploy which Huntress researchers have seen in other social engineering attacks. Unbeknownst to Saayman, the install led to the RAT.


Figure 2: axios maintainer Jason Saayman talked about the attacker’s social engineering tactics

But even beyond initial access, the entire open source ecosystem is built on a foundation of trust. Developers often assume that because a package is popular or widely used, it has been thoroughly vetted. Many developers pull down packages based on name and utility without verifying the identity of the maintainer or the integrity of the code.

To break this cycle, there are a few critical steps that maintainers, developers, and end users can take that might help mitigate against a future open source supply chain attack:

  • Rather than automatically pulling the latest version of a dependency, developers should "pin" their dependencies to specific, verified versions and use a private repository or "quarantine" area to vet new versions before they are used in production.
  • Developers should set time of “age-based” restrictions for new package versions, so that the industry can evaluate and respond to the versions first. 
  • Make sure all dependencies (from systems to accounts) are as trustworthy as the high-privilege object they’re accessing (this is also known as the Clean Source Principle). Know what’s in your software.

Like what you just read? Join us every month for Tradecraft Tuesday, our live webinar where we expose hacker techniques and talk nerdy with live demos. Snag your spot now!



Categories
Cybersecurity Education
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab
AI sparkle iconSummarize This Page
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab

What's your social profile giving away?

On May 20 (12pm EST), join Truman Kain and Caitlin Sarian ("Cybersecurity Girl") for the latest edition of _declassified and learn how attackers turn social media into intel.
Register now
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • GWS and Business Email Compromise: Why BEC Is Now an Identity Problem

    Modern BEC attacks now abuse Google Workspace identities. Discover why BEC is an identity problem, and learn how to secure your organization against these threats.
  • Huntress Heads Into Q2 Serving More SMBs and 2 Million Endpoints

    We're so excited to say we're now securing more than two million endpoints!
  • Interconnected Devices Inject Risk into Patient Safety

    By adopting a managed EDR and partnering with experts like Huntress, healthcare providers can safeguard patient data and ensure uninterrupted patient care.
  • From Mandates to Assurance: How Managed SIEM Helps Decode Compliance Across the Globe

    Understand how Managed SIEM supports your compliance journey worldwide.
  • Critical Vulnerability Disclosure: ConnectWise/R1Soft Server Backup Manager Remote Code Execution & Supply Chain Risks

    Huntress has validated an initial report for an authentication bypass and sensitive file leak present in the Java framework “ZK”, used within the ConnectWise R1Soft software Server Backup Manager SE.
  • Peeling Back the Layers of .NET Malware

    Hackers always try to cover up their tracks. In this blog, we step through layers of obfuscation to uncover the real intent of a .NET malware sample.
  • Ransomware Canaries: A 2022 Update

    Read about the exciting new updates to our Ransomware Canaries service.
  • Mistakes to Mastery: Get to Know Phishing Defense Coaching from Huntress SAT

    Get to know Phishing Defense Coaching, the latest addition to Huntress SAT. This personalized feature helps teach learners how phishing simulations tricked them so they can better identify potential threats.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 242k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy