Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 
 
Resources Videos
Security operations

Red Canary SecOps Weekly: Episode 59 – The anatomy of the axios compromise

SecOps Weekly | 04.07.26

The anatomy of the axios compromise

Red Canary malware expert Tony Lambert gives a post-mortem on the Axios npm supply chain attack, walks through the exploit chain step by step, and gives guidance to better harden npm environments.

SHOW NOTES

This latest episode of Red Canary SecOps Weekly features Red Canary experts Tony Lambert and Keith McCammon discussing the recent axios npm package supply chain attack that occurred in March 2026, where North Korean threat actors (UNC1069) compromised a maintainer’s account and published malicious versions of the popular package.

The attack affected versions 1.14.1 and 0.30.4, which are downloaded millions of times weekly. The compromise began with a social engineering attack where the maintainer was tricked into installing malicious software during a fake company meeting.

The attackers injected a dependency that would download remote access trojans for Windows (PowerShell), Linux (Python), and macOS (Mach-O binary called WAVESHAPER.V2).

Red Canary detected malicious activity across all three operating systems but found no follow-on activity, suggesting the attackers may have been overwhelmed by their success. The session covers detection methods, remediation steps for affected systems, and preventive measures including package pinning, using private repositories, implementing cool-down periods, and enabling two-factor authentication for maintainers.

Timestamps:

  • 00:00 – Introduction
  • 01:04 – Welcome to SecOps Weekly!
  • 01:58 – Anatomy of the Axios compromise
  • 04:34 – A high-level look at the compromise
  • 09:50 – A walkthrough of the chain
  • 18:54 – What to do now
  • 23:51 – What to do if you are a customer
  • 28:44 – What to do if you’re the maintainer

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top