Skip to content
Tech News
← Back to articles

Hacker hijacks Axios open-source project, used by millions, to push malware

read original get Cybersecurity Software Suite → more articles
Why This Matters

The recent hijacking of the Axios open-source library highlights the growing threat of supply chain attacks in the tech industry, risking widespread compromise for millions of developers and their users. This incident underscores the importance of robust security measures and vigilance in open-source software management to protect critical infrastructure and consumer data.

Key Takeaways

A hacker has hijacked and modified a popular open-source software development tool to deliver malware that could put millions of developers at risk of being compromised.

On Monday, a hacker pushed malicious versions of the widely used JavaScript library called Axios, which developers rely on to allow their software to connect to the internet. The affected library was hosted on npm, a software repository that stores code for open-source projects. Axios is downloaded tens of millions of times every week.

The hijack was spotted and stopped in around three hours overnight on Monday into Tuesday, according to security firm StepSecurity, which analyzed the attack.

Hackers are increasingly targeting developers of popular open-source projects in an effort to mass-hack anyone who relies on the compromised code, potentially granting the hackers access to vast numbers of affected devices. These kinds of widespread breaches are called supply chain attacks because they target software that allows hackers to then hack whoever downloaded the compromised software. In recent years, hackers have targeted companies like 3CX, Kaseya, and SolarWinds, as well as open source tools such as Log4j and Polyfill.io, to target large numbers of their users.

It’s unclear at this point how many people downloaded the malicious version of Axios during that timespan. Security company Aikido, which also investigated the incident, said anyone who downloaded the code “should assume their system is compromised.”

Contact Us Do you have more information about this hack? Or other supply chain attacks? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or . Do you have more information about this hack? Or other supply chain attacks? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or by email

The hacker was able to slip malicious code inside Axios by compromising the account of one of the project’s primary developers, who was authorized to push out updates. The hacker replaced the legitimate developer’s email address on the account with their own, making it more difficult for the developer to regain access.

Once in control of the account, the hacker inserted malicious code designed to deliver a remote access trojan, or RAT — essentially malware that can give hackers full, remote control of a victim’s computer. The hacker then pushed out new versions of Axios in a legitimate-looking update for Windows, macOS, and Linux users.

Techcrunch event Disrupt 2026: The tech ecosystem, all in one room Your next round. Your next hire. Your next breakout opportunity. Find it at TechCrunch Disrupt 2026, where 10,000+ founders, investors, and tech leaders gather for three days of 250+ tactical sessions, powerful introductions, and market-defining innovation. Register now to save up to $400. Save up to $300 or 30% to TechCrunch Founder Summit 1,000+ founders and investors come together at TechCrunch Founder Summit 2026 for a full day focused on growth, execution, and real-world scaling. Learn from founders and investors who have shaped the industry. Connect with peers navigating similar growth stages. Walk away with tactics you can apply immediately

... continue reading