HomeRisk ManagementsHackers Compromise Axios npm Package to Distribute RATs

Hackers Compromise Axios npm Package to Distribute RATs

Published on

spot_img

Security Breach in Open Source: Axios Maintainer Account Compromised to Spread Malware

In a troubling development for the open-source community, threat actors have successfully targeted an account belonging to Jason Saayman, the maintainer of the highly popular JavaScript library Axios. This breach has sparked significant concern as Axios is downloaded over 100 million times per week and is integral to numerous developer environments as well as CI/CD (Continuous Integration/Continuous Deployment) pipelines worldwide.

According to findings from OpenSourceMalware, the attackers managed to compromise Saayman’s account and insert a malicious npm package, dubbed plain-crypto-js, as a dependency within Axios. This malevolent action exemplifies the sophisticated tactics employed by the assailants, who appeared to have staged the introduction of the malicious dependency just a day prior to taking control of the maintainer’s account. Such meticulous planning showcases a level of expertise that raises alarms about the vulnerabilities within the software development ecosystem.

To solidify their control, the intruders not only altered Saayman’s email address on the account—ensuring continued access—but also breached his GitHub account. This double intrusion indicates a strategic move to secure their position and inhibit any immediate counteractions. As per the OpenSourceMalware report, “On GitHub, the attacker used admin privileges to unpin and delete an issue reporting the compromise, all the while the legitimate collaborator, DigitalBrainJS, was attempting to respond.” Lacking administrative control, DigitalBrainJS found it necessary to escalate the situation to npm’s administration team, who eventually intervened approximately three hours into the attack, removing the harmful versions and revoking all compromised tokens.

The malicious versions of Axios that were published included v1.14.1 and v0.30.4, both of which featured the dangerous plain-crypto-js dependency. Notably, while genuine Axios releases are deployed through GitHub Actions using OIDC (OpenID Connect) provenance signing, the malicious packages were evidently published straight through the npm CLI with Saayman’s stolen credentials, further underscoring the seriousness of the breach.

The Broader Impact and Threat Assessment

As the fallout from the Axios-related attack continues to unfold, Google has issued a stern warning about the extensive ramifications this breach may have. Given that many popular packages rely on Axios, the potential impact on the broader software ecosystem could be significant. Austin Larsen, a principal threat analyst at Google’s Threat Intelligence Group (GTIG), has urged security teams to take immediate action by checking their lockfiles—specifically reviewing package-lock.json, yarn.lock, or pnpm-lock.yaml for any signs of the malicious packages—while also looking for indicators of compromise (IOCs) across developer machines and CI/CD infrastructure.

Furthermore, GTIG attributed the malicious activity to UNC1069, a financially motivated threat actor linked to North Korea and active since at least 2018. The assessment suggests that this group may be state-sponsored, utilizing updated versions of their previously employed malware, known as WAVESHAPER.V2. This attribution was elaborated upon in a blog post released by GTIG on March 31.

OpenSourceMalware elaborated on the complexity and sophistication displayed by the attackers, commenting, “The multi-stage architecture, platform-specific payloads, and comprehensive RAT capabilities demonstrate that attackers are investing significant resources into supply chain attacks.” The use of advanced techniques for obfuscation, anti-analysis measures, and self-deletion illustrate a keen awareness of modern threat detection methods, aiming to circumvent them effectively. Targeting Axios—with its staggering weekly download numbers—suggests the attackers possess a deep understanding of the npm ecosystem and the potential for widespread disruption.

Avital Harel, a security researcher at Upwind, accentuated the implications of this attack, emphasizing that “the build pipeline is becoming the new front line” in the ongoing battle against open-source threats. She further noted, “Attackers recognize that if they can breach the systems responsible for building and distributing software, they can inherit trust on a massive scale.”

This latest incident serves as a clarion call for organizations involved in software development to scrutinize their CI/CD systems, package dependencies, and overall developer environments more rigorously. As these vulnerabilities become increasingly exploited by attackers, the need for enhanced security measures has never been more pressing. The incident not only underscores the escalating threats faced by the open-source community but also emphasizes the urgent need for a proactive approach to cybersecurity within development practices.

Source link

Latest articles

WhatsApp Attack Chain Distributes VBS, Cloud Payloads, and MSI Backdoor

Rising Threat of Malware Campaigns Utilizing WhatsApp for VBS Distribution A recently identified malware campaign...

Tools zur Sicherung des MCP-Servers | CSO Online

Expanding Awareness on Model Context Protocol Security The Model Context Protocol (MCP) has emerged as...

OpenAI Shuts Down Sora App Due to Deepfake Concerns

OpenAI has officially announced the discontinuation of Sora, a short-form video application that gained...

More like this

WhatsApp Attack Chain Distributes VBS, Cloud Payloads, and MSI Backdoor

Rising Threat of Malware Campaigns Utilizing WhatsApp for VBS Distribution A recently identified malware campaign...

Tools zur Sicherung des MCP-Servers | CSO Online

Expanding Awareness on Model Context Protocol Security The Model Context Protocol (MCP) has emerged as...

OpenAI Shuts Down Sora App Due to Deepfake Concerns

OpenAI has officially announced the discontinuation of Sora, a short-form video application that gained...