Coding4Food LogoCoding4Food
HomeCategoriesArcadeBookmarks
vi
HomeCategoriesArcadeBookmarks
Coding4Food LogoCoding4Food
HomeCategoriesArcadeBookmarks
Privacy|Terms

© 2026 Coding4Food. Written by devs, for devs.

All news
IT DramaTechnology

Axios Compromised on NPM: When Your Favorite HTTP Client Drops a Trojan

April 1, 20263 min read

The ultimate NPM nightmare: Malicious Axios versions caught dropping remote access trojans. Here's what happened and how to avoid getting pwned.

Share this post:
hacker, hacking, theft, cyber, malware, computer, security, credit card, virus, internet, screen, trojan, evil, program, thief, comic, cartoon character, programming, it, evil hackers, hacker, hacker, hacker, hacker, hacker, hacking, malware, thief
Nguồn gốc: https://coding4food.com/post/axios-compromised-npm-trojan-malware. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/axios-compromised-npm-trojan-malware. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/axios-compromised-npm-trojan-malwareNguồn gốc: https://coding4food.com/post/axios-compromised-npm-trojan-malware. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/axios-compromised-npm-trojan-malware. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/axios-compromised-npm-trojan-malware
Nguồn gốc: https://coding4food.com/post/axios-compromised-npm-trojan-malware. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/axios-compromised-npm-trojan-malware. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/axios-compromised-npm-trojan-malwareNguồn gốc: https://coding4food.com/post/axios-compromised-npm-trojan-malware. Nội dung thuộc bản quyền Coding4Food. Original source: https://coding4food.com/post/axios-compromised-npm-trojan-malware. Content is property of Coding4Food. This content was scraped without permission from https://coding4food.com/post/axios-compromised-npm-trojan-malware
axiosnpmtrojanmã độcnode.jsbảo mậthacker news
Share this post:

Bình luận

Related posts

TanStack's NPM Nightmare: A Supply-Chain Attack and What We Can Learn From It
TechnologyIT Drama

TanStack's NPM Nightmare: A Supply-Chain Attack and What We Can Learn From It

TanStack just got hit by an NPM supply-chain attack. Here's a raw breakdown of what went down, the community fallout, and how to protect your code.

May 123 min read
Read more →
coding, computer, hacker, hacking, html, programmer, programming, script, scripting, source code, coding, coding, coding, coding, computer, computer, hacker, hacker, hacker, hacker, hacker, hacking, hacking, programming, programming
TechnologyIT Drama

GitHub Breached: 3,800 Repos Nuked by a Sketchy VSCode Extension

GitHub confirms 3,800 repos were compromised via a malicious VSCode extension. Time to audit your editor before your source code gets leaked.

May 212 min read
Read more →
padlock, lock, chain, key, security, protection, safety, access, locked, link, crime, steel, privacy, secure, criminal, shackle, danger, thief, theft, vulnerable, restrain, break-in, protect, strong, padlock, padlock, lock, lock, lock, lock, lock, chain, crime, privacy, privacy, thief, thief, theft, strong
IT DramaTechnology

Tech Drama: Is Meta Shadowbanning Human Rights Accounts in Saudi Arabia & UAE?

Meta is facing backlash over allegedly using geo-blocking to hide human rights content in Saudi Arabia and the UAE. Dive into the Hacker News drama!

May 212 min read
Read more →
student loan debt, education, college, student loan debt, student loan debt, student loan debt, college, college, college, college, college
TechnologyIT Drama

Academic Panic Room: MIT President Sounds Alarm on Cash and Brain Drain to Big Tech

MIT's President drops a reality check about funding and the talent pipeline. Grab your popcorn, folks, the academic elite are sweating over Big Tech's money.

May 152 min read
Read more →
office, work, desk, computer, workplace, indoor, business, home office, designer, web developer, gray business, gray computer, gray office, gray home, gray laptop, gray work, gray desk, gray design, gray company, gray web, office, office, office, office, office, work, work, computer, computer, business, business, home office, home office, home office, designer, designer
TechnologyIT Drama

Hacker News Meltdown: Googlebook's Bizarre Redirect and the Art of Testing in Prod

The legit googlebook.google domain hit the front page of HN, only to redirect to an ancient Reddit thread. Are Google devs trolling, or is it a huge oopsie?

May 132 min read
Read more →
matrix, man, portrait, face, model, masculine, adults, attractive, style, serious, good looking, person, binary code, binary, binary system, byte, bits, crash, information, infestation, infested, operating system, computer, computer virus, file, data exchange, digital, diskette, infected, computer science, communication, web, network, programming, server, script, transfer, trojan, networking, viruses, virus, virus warning, matrix, matrix, matrix, matrix, matrix
Technology

Mad Lad Builds a Browser-Based Virtual Museum of Almost Every Operating System

A gigachad on Hacker News just dropped the Virtual OS Museum, letting you boot up ancient operating systems right in your browser. Say goodbye to your RAM!

May 203 min read
Read more →

Alright folks, gather 'round. If you've written a single line of modern JavaScript, you know Axios. It's the holy grail, the undisputed king of HTTP clients. But what happens when the very tool you use to fetch your cat memes decides to fetch a hacker into your system?

Yep, you heard that right. Axios just had a massive supply chain nightmare on NPM.

The Meltdown: How a Trojan Snuck into Axios

Shoutout to the security folks at StepSecurity for catching this absolute dumpster fire. Here's the TL;DR of what actually went down:

  • The Trojan Delivery: Malicious packages disguised as, or injected into, Axios versions were spotted in the wild. You hit npm install, expecting a smooth HTTP request experience, but you get a Remote Access Trojan (RAT) as a bonus.
  • Full Pwnage: This RAT effectively opens a backdoor to your local machine or cloud vps. The attacker gets remote control, meaning they can steal your environment variables, grab your source code, or just pivot into your company's internal network.
  • Supply Chain Attack: This is the classic "I didn't hack you, I hacked your dependencies" move. It's terrifying because we trust these popular libraries blindly.

Reddit & HN Going Full Doom-Mode

With over 1600 upvotes on Hacker News, the community reaction was a mix of pure panic and bitter "I told you so" moments.

  • The "NPM is Broken" Camp: A huge chunk of devs are just exhausted. NPM's ecosystem relies on a web of trust that is fundamentally flawed. Anyone can push a package, and automated malware scanning is clearly not bulletproof.
  • The Vanilla JS Purists: Predictably, the "just use native fetch" gang is having a field day. And honestly? They have a point. Why drag in a third-party dependency for something modern browsers and Node.js handle natively now?
  • The Paranoia Squad: Thousands of devs collectively sweating, checking their node_modules size, and wondering if that weird CPU spike yesterday was just Docker being Docker, or a crypto-miner courtesy of a compromised package.

The C4F Verdict: Survive the Dependency Hell

Look, Axios isn't entirely to blame here. The real issue is our culture of blindly trusting npm install and treating third-party code like it's written by infallible tech gods.

Here’s how you stop being a sitting duck:

  1. Pin Your Damn Dependencies: Stop using ^ or ~ in your package.json. Lock your versions down with package-lock.json or yarn.lock. If a library updates, you review it first. No exceptions.
  2. Audit Regularly: Run npm audit or integrate tools like Snyk into your CI/CD pipelines. It won't catch zero-days, but it stops you from using known compromised garbage.
  3. Evaluate Your Stack: Do you really need Axios in 2024? If you're spinning up a new project, maybe just give the native fetch API a chance.

Stay frosty out there, devs. Trust no one, not even your package.json.


Source: Axios compromised on NPM – Hacker News | StepSecurity Blog