Quit Yapping
Millions of JS devs just got penetrated by a RAT…
4:59
Watch on YouTube ↗
F
Fireship·Tech

Millions of JS devs just got penetrated by a RAT…

TL;DR

Two malicious Axios versions on npm (100M weekly downloads) installed a RAT via a rogue dependency and post-install script to steal developer credentials.

Key Points

  • 1.Axios was compromised via a supply-chain attack, not dirty source code. Two malicious versions were published to npm by an attacker who compromised the maintainer's npm account, publishing under a Proton Mail address instead of the normal GitHub Actions workflow.
  • 2.The attack used a fake 'plain-crypto-js' package as a RAT dropper. It mimicked the legitimate crypto-js library, ran a post-install script, reached out to a command-and-control server, and downloaded an OS-specific second-stage payload to establish remote access.
  • 3.The RAT actively covered its tracks to evade detection. After installation it deleted itself, removed the package.json post-install script entry, and cleaned up so that running 'npm audit' raised zero red flags.
  • 4.Compromised machines risk exposure of AWS credentials, OpenAI API keys, and more. Developers should check for the 'plain-crypto-js' package in node_modules, run the provided OS-specific detection commands, immediately rotate all API keys, and follow Step Security's remediation guide.

Life's too short for long videos.

Summarize any YouTube video in seconds.

Quit Yapping — Try it Free →