The Axios Attack Proved npm audit Is Broken. Here's What Would Have Caught It
Five days ago, North Korean state hackers hijacked one of the most trusted packages in the JavaScript ecosystem, axios, with 100 million weekly downloads, and turned it into a Remote Access Trojan ...

Source: DEV Community
Five days ago, North Korean state hackers hijacked one of the most trusted packages in the JavaScript ecosystem, axios, with 100 million weekly downloads, and turned it into a Remote Access Trojan delivery system. The attack was live on npm for three hours. npm audit flagged nothing. If you ran npm install during that window, your machine may have been silently backdoored. Here's exactly how the attack worked, why traditional tools missed it, and how behavioral analysis would have caught it before a single byte of malicious code executed. The attack, minute by minute The timeline shows a methodical, multi-stage operation: Time (UTC) Event Mar 30, 05:57 [email protected] published, a clean decoy to establish publishing history Mar 30, 23:59 [email protected] published, now with a malicious postinstall hook Mar 31, 00:21 [email protected] published, adds plain-crypto-js as a dependency Mar 31, 01:00 [email protected] published, targeting legacy users still on 0.x Mar 31, ~03:15 npm yanks b