Task-specific Atlas Agents investigate threats at machine speed with full transparency, expert validation, and explainable outcomes you can trust.
Atlas Extended Detection and ResponseOpen XDR with Agentic AI & machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Atlas User ExperienceSee what our SOC sees, review investigations, and see how we are protecting your business.
Atlas Platform IntegrationsSeamless integrations and threat investigation that adapts to your tools and evolves with your business.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Threat Response Unit (TRU)Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Cyber Resilience TeamExtend your team capabilities and prevent business disruption with expertise from eSentire.
Response and RemediationWe balance automated blocks with rapid human-led investigations to manage threats.
Combine AI-driven security operations, multi-signal attack surface coverage and 24/7 Elite Threat Hunters to help you take your security program to the next level.
Get unlimited Incident Response with threat suppression guarantee - anytime, anywhere.
CTEM and advisory programs that identify security gaps and build proactive strategies to address them.
Flexible MDR pricing and packages that fit your unique security requirements.
Entry level foundational MDR coverage
Comprehensive Next Level eSentire MDR
Next Level eSentire MDR with Cyber Risk Advisors to continuously advance your security program
Stop ransomware before it spreads.
Identity ResponseStop identity-based cyberattacks.
Zero Day AttacksDetect and respond to zero-day exploits.
Cybersecurity ComplianceMeet regulatory compliance mandates.
Third-Party RiskDefend third-party and supply chain risk.
Cloud MisconfigurationEnd misconfigurations and policy violations.
Cyber RiskAdopt a risk-based security approach.
Mid-Market SecurityMid-market security essentials to prioritize.
Sensitive Data SecurityProtect your most sensitive data.
Cyber InsuranceMeet insurability requirements with MDR.
Cyber Threat IntelligenceOperationalize cyber threat intelligence.
Security LeadershipBuild a proven security program.
On March 31st, 2026, threat actors compromised the Axios npm (Node Package Manager) package, publishing two malicious versions, 1.14.1 and 0.30.4, to the npm registry. This supply chain…
On March 27th, 2026, F5 confirmed exploitation of a previously known vulnerability in its BIG-IP Access Policy Manager (APM) versions. The flaw, tracked as CVE-2025-53521 (CVSS: 9.3),…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
About Us Leadership Careers Event Calendar → Newsroom → Aston Villa Football Club →We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Search our site
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
We offer three flexible MDR pricing packages that can be customized to your unique needs.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
eSentire's Security Advisory on this incident can be found here: https://www.esentire.com/security-advisories/axios-npm-packages-compromised
Late in the evening on Monday, March 30th (early morning March 31st UTC) Axios, one of the most popular JavaScript HTTP client libraries became the target of a supply chain attack when two backdoored versions ([email protected] and [email protected]) were published using a compromised maintainer account.
These versions were live for approximately a three-hour window and introduced a malicious dependency that silently installed a RAT on Windows, macOS and Linux hosts. The campaign has been attributed to a North Korean threat actor UNC1069 (also tracked as Sapphire Sleet, STARDUST CHOLLIMA).
The tampered package was identified by Elastic Security Labs who notified the community and later released detailed analysis of the infection chain and payloads which have now been widely dissected and reported.
When the compromised packages went live, eSentire's Security Operations Center (SOC) began responding to malware cases across Windows and macOS hosts. Following the public disclosure of the compromise by Elastic Security Labs, eSentire's Threat Response Unit (TRU) validated existing cases and initiated an in-depth threat hunt across all customers.
We identified a total of 19 affected customers, primarily within the software industry across North America and EMEA.
Axios is a popular, open-source promise-based HTTP client for JavaScript. It simplifies making HTTP requests (like GET, POST, PUT, DELETE, etc.) in both the browser and Node.js environments using the same codebase. It is a popular choice for developers over the native fetch() API.
Axios has over 100,000,000 weekly downloads and 174,121 dependent packages making it one of the most popular packages available.
The tampered versions of Axios added a dependency for [email protected], which triggers a postinstall hook that executes the first stage payload (setup.js, tracked as SILKBELL). SILKBELL subsequently connects to attacker-controlled infrastructure to download the cross-platform RAT, which Mandiant tracks as WAVESHAPER.V2 and CrowdStrike tracks as ZshBucket.
Regardless of the operating system, the malware beacons to the Command and Control (C2) endpoint over port 8000 at 60-second intervals using a spoofed Internet Explorer 8 User-Agent string.
A brief summary of the platform-specific execution behavior and RAT functions are included below:
Note: Across all three operating systems, the malware connects to the exact same Command and Control (C2) endpoint but sends a platform-specific POST body (product1 for Windows, product0 for macOS, and product2 for Linux) so the server knows which payload to return
A summary of the command and control (C2) response options for the malware include:
The earliest known infection in our telemetry occurred minutes after publication of the malicious [email protected] release.
A high-level timeline of events is shown below:
2026-03-31 00:21 UTC – Malicious [email protected] published
2026-03-31 00:25 UTC – Earliest known infection observed
2026-03-31 01:00 UTC – [email protected] published
2026-03-31 01:46 UTC – Joe Desimone Tweet notifying community
2026-03-31 01:50 UTC – Elastic team files GitHub security advisory
2026-03-31 03:25 UTC – Affected packages removed
While discussion of a possible Axios supply chain compromise played out, our SOC was actively responding to detection events for activity associated with the payload delivery. For Windows hosts, the suspicious renamed PowerShell processes attempting to masquerade as wt.exe on Windows hosts was consistently flagged while on macOS detections for suspicious file ingress and the Mach-O binary (/Library/Caches/com.apple.act.mond) were also identified and triaged accordingly. The Linux payload was not observed on monitored hosts.
The figure below shows some of the automated triage associated with a Windows detection within the first 30 minutes of the supply chain attack. This triage correctly classified the payload delivery sequence as a high severity intrusion and recommended immediate containment and escalation of the host.

Following open-source reporting of the compromise, our TRU team worked with our SOC Cyber Analysts to validate existing cases and initiate our initial threat hunts on the evening of March 30th.
This was followed up with an in-depth threat hunting engagement across all customers the morning of March 31st. This hunt included known and suspected indicators of compromise and was repeated as new information emerged.
A total of 19 customers were affected between North America and EMEA regions. The majority of these infections occurred within the first hour, with some occurring minutes after the package update.

Given the ubiquitous use of Axios in web development, the software industry naturally bore the brunt of the impact. The geographic concentration of infections skewed outside of North America, a distribution correlated to the timing of the attack. The approximate three-hour window during which the compromised packages were live coincided with the start of the workday and automated CI/CD pipeline runs in EMEA, while North American teams were largely offline.

Overall, the observed impact would appear relatively small for such a popular npm package. This is thanks to existing endpoint detection of payload delivery mechanisms and quick response from the security community to quickly notify package maintainers and raise awareness of the issue.
We also noted connection issues with the C2, whether this was due to volume of requests or deliberate action by the adversary is unknown. As of writing follow-on activity from the RAT has not been identified, but analysis remains ongoing.
Open-source supply chain attacks remain a highly attractive vector for adversaries, as these campaigns abuse the inherent trust developers and organizations place in collaborative code-sharing communities. While foundational preventative measures, such as pinning exact package versions, sandboxing developer environments, and disabling automated dependency upgrades, are crucial first steps, they cannot entirely stop a sophisticated adversary from compromising a widely trusted package.
The incident emphasizes the necessity of defense-in-depth through continuous endpoint monitoring and active threat hunting – the core components of Managed Detection and Response (MDR). When preventative gates are inevitably bypassed, security teams must rely on catching the post-exploitation behavior on the host machine.
During the Axios attack, early detections did not originate from the npm registry, but from endpoint telemetry flagging the payload delivery mechanisms such as renamed PowerShell processes attempting to masquerade as wt.exe.
Ultimately, defending against advanced supply chain threats requires an "assume breach" mentality. Pairing strict dependency hygiene with continuous behavioral monitoring ensures that when a trusted open-source tool is weaponized, the resulting anomalous execution is identified and contained before threat actors can establish persistence or exfiltrate data.
For detailed recommendations, read our latest security advisory and NPM Security best practices published by OWASP. In addition, implementing package release cooldowns can create a buffer during which fresh packages are inspected/scanned for tampering.
Here is how you would configure a 7-day (or equivalent) delay across the JavaScript ecosystem:
Exclusion lists such as minimumReleaseAgeExclude in pnpm or npmPreapprovedPackages in Yarn can allow fine tuning of these policies to exempt trusted internal packages.
To learn how your organization can build cyber resilience and prevent business disruption with eSentire’s Next Level MDR, connect with an eSentire Security Specialist now.
GET STARTED
As part of the broader Threat Response Unit, Spence is responsible for monitoring the evolving threat landscape and collaborating with TRU members to respond to ongoing threats. Throughout his tenure at eSentire, he has progressed through various analytical, training, and leadership roles, bringing extensive experience in threat research and security operations to the organization.