Mission

Axios Supply Chain Attack: What MSPs Must Do Now

Axios Supply Chain Attack: What MSPs Must Do Now

The alert hit Reddit on a Tuesday afternoon: New axios 1.14.1 and 0.30.4 on npm are likely malicious. Within hours, the post had thousands of upvotes and a thread full of engineers frantically checking their package-lock.json files. For most small businesses and the MSPs who support them, the reaction was silence — not because they weren't affected, but because they had no idea the library existed in their stack in the first place.

That's the real problem.

What Actually Happened to Axios

Axios is not some obscure utility. It's one of the most downloaded JavaScript libraries on the planet — a tool used to make HTTP requests in web applications, client portals, and backend services. If your business runs any kind of web app, there is a reasonable chance Axios is buried somewhere in your dependency tree.

According to The Hacker News, the attack was carried out by UNC1069, a North Korean threat actor with a track record of sophisticated social engineering operations. The attackers didn't hack the Axios codebase directly — they targeted the human maintaining it. Through a highly targeted spear-phishing campaign, they convinced a trusted maintainer to grant them access. The maintainer himself later confirmed the social engineering campaign was convincing enough to fool someone who knew what they were doing.

The result: malicious code was slipped into two npm releases and distributed to anyone who updated or installed the package during the exposure window. Nation-state patience. Nation-state precision. Community-package delivery.

This Wasn't a One-Off

If you're tempted to treat the Axios incident as an anomaly, the timeline says otherwise.

Within 24 hours of the Axios alert, The Hacker News reported that 36 additional malicious npm packages had been identified — disguised as legitimate Strapi CMS plugins — deploying persistent implants through Redis and PostgreSQL connections. Same attack pattern. Different package names. Different victims.

And the blast radius doesn't stop at the library. According to a separate report on the LiteLLM compromise, attackers used a poisoned open source AI package to turn developer workstations into credential vaults — harvesting cached API keys, cloud tokens, and service credentials that were then reused for lateral movement across connected environments. A compromised library doesn't stay in the library. It pivots.

As The Hacker News noted in their MSP-focused analysis, the next major breach for most organizations won't come from inside their walls — it will come through a vendor or tool they already trust. Axios was trusted. That's why it worked.

Why Small Businesses Are Especially Exposed

Enterprise security teams have dedicated staff running software composition analysis (SCA) tools, maintaining software bills of materials (SBOMs), and monitoring dependency feeds. Small businesses and lean MSP teams typically don't.

The libraries in your clients' web apps were probably chosen by a developer years ago, installed once, and never revisited. Nobody is checking whether the version pinned in package.json has been flagged. Nobody is running npm audit on a schedule. Nobody has a list of what third-party libraries are even present.

That's not negligence — it's capacity. But the legal and compliance exposure is real. If you're supporting government contractors working toward CMMC Level 1 compliance, unpatched third-party libraries in a web application are exactly the kind of gap auditors look for. Ohio businesses pursuing SB 220 safe harbor protection need demonstrable patch management practices — and "we didn't know the library existed" is not a safe harbor defense.

We've also covered how similar exposure plays out with credential theft in our post on accidental credential exposure through third-party integrations — the attack path from a compromised library to a stolen API key is shorter than most teams realize.

Three Steps MSPs Can Take This Week

You don't need an enterprise budget to close the most critical gaps. Here's where to start.

1. Run a Dependency Audit on Client Web Applications

For any JavaScript-based application, run npm audit from the project root. This surfaces known vulnerabilities in installed packages, including transitive dependencies (libraries your libraries depend on). For Python projects, pip-audit does the same job. Flag anything with a high or critical severity rating and prioritize patches for packages that handle HTTP requests, authentication, or data serialization — the highest-value targets for attackers.

2. Build a Basic Software Bill of Materials

A software bill of materials (SBOM) is simply a list of every third-party component in an application and the version in use. Tools like Syft (free, open source) can generate one automatically. You don't need to maintain it manually — generate it on a schedule and compare versions against the National Vulnerability Database or your vulnerability scanner's feed. This is also increasingly required for CMMC and FedRAMP-adjacent work.

3. Subscribe to Ecosystem Alerts and Tighten Update Cadence

The Axios community caught this fast because people were watching. Subscribe your team to the npm security advisories feed, the GitHub Advisory Database, and the CISA Known Exploited Vulnerabilities catalog. Set a patch window — even monthly is dramatically better than never. For critical packages like HTTP clients, authentication libraries, and anything touching payment or PII data, treat patches as emergency changes with a 72-hour SLA.

For a broader look at how supply chain attacks move from open source libraries into OAuth tokens and downstream services, our post on supply chain attacks and OAuth token theft walks through the full attack chain.

The Maintainer Was the Target — And That Changes Everything

The most important lesson from the Axios incident isn't technical — it's human. UNC1069 didn't exploit a code vulnerability. They exploited trust. They identified a person with commit access, built rapport, and socially engineered their way into the release pipeline.

That means no amount of code review catches this if the reviewer is the compromised party. It means your clients' exposure to supply chain risk is partly a function of how well the upstream maintainers of their dependencies resist social engineering — something entirely outside your control.

What is in your control: knowing what's in your stack, knowing when it changes, and having a process to respond when the next alert drops.


Take Action: Don't Wait for the Next Alert

The Axios attack confirmed what security practitioners have been warning about for years — your open source dependencies are part of your attack surface, and most small businesses have no visibility into them at all.

Proactive scanning catches these gaps before attackers do. Oscar Six Security's Radar gives small businesses and MSPs an affordable way to surface vulnerability exposure — including outdated and flagged dependencies — for $99 per scan. No enterprise contract. No six-month implementation. Just clear, actionable findings you can act on this week.

Focus Forward. We've Got Your Six.

See how Radar works →

Frequently Asked Questions

What is the Axios npm supply chain attack?

In early 2026, North Korean threat actor UNC1069 used spear-phishing to compromise a trusted Axios maintainer, then pushed malicious code into two npm releases (axios 1.14.1 and 0.30.4). Any application that updated or installed Axios during the exposure window may have received compromised code. The incident was confirmed by The Hacker News and attributed to a nation-state operation.

How do I check if my app is affected by a malicious npm package?

Run `npm audit` in your project directory to surface known vulnerabilities in installed packages, including transitive dependencies. Cross-reference your installed versions against the GitHub Advisory Database and the npm security advisories feed. If you manage multiple client environments, Oscar Six Security's Radar can help surface outdated and flagged dependencies as part of a broader vulnerability scan.

What is a software bill of materials and do small businesses need one?

A software bill of materials (SBOM) is an inventory of every third-party library and component used in an application, including version numbers. Small businesses — especially government contractors pursuing CMMC compliance — increasingly need one to demonstrate patch management practices and supply chain risk awareness. Free tools like Syft can generate an SBOM automatically without any enterprise tooling.

How much does a vulnerability scan cost for a small business?

Vulnerability scans for small businesses typically range from free (basic automated tools) to several hundred dollars for a professional scan with actionable reporting. Oscar Six Security's Radar offers professional vulnerability scanning for $99 per scan — designed specifically for small businesses and MSPs who need real findings without an enterprise price tag. See options at oscarsixsecurityllc.com/#solutions.

Can a supply chain attack affect my small business if I don't write code?

Yes. If your business uses any web application, client portal, or SaaS tool built on JavaScript or Python, third-party libraries are almost certainly present in that software — and you may have no visibility into whether they've been patched. Supply chain attacks like the Axios compromise target the libraries developers trust, meaning the risk reaches your environment without anyone on your team writing a single line of code.

Step-by-Step Guide

  1. Run a dependency audit

    From your JavaScript project root, run `npm audit` to identify known vulnerabilities in installed packages and their dependencies. For Python projects, use `pip-audit` to surface the same information.

  2. Generate a software bill of materials

    Use a free tool like Syft to automatically generate an SBOM listing every third-party component and version in use. Store this file in version control and regenerate it on a monthly schedule or after any major dependency update.

  3. Subscribe to ecosystem security feeds

    Subscribe your team to the npm security advisories feed, the GitHub Advisory Database, and the CISA Known Exploited Vulnerabilities catalog so you receive alerts when packages in your stack are flagged.

  4. Set a patch cadence with emergency SLA

    Establish a monthly patch window for routine dependency updates and a 72-hour SLA for critical packages — especially HTTP clients, authentication libraries, and anything handling PII or payment data.

  5. Scan client environments for exposure

    Use a vulnerability scanner like Oscar Six Security's Radar to surface outdated and flagged dependencies across client environments, providing a documented audit trail for compliance and cyber insurance purposes.