Axios NPM Compromise File Creation Indicators - Windows
Detects file creation events linked to the Axios NPM supply chain compromise. Axios is a popular JavaScript HTTP client. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection. The attack used cscript.exe (VBScript), curl.exe (C2), and PowerShell masquerading as Windows Terminal.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Developed to detect an active or emerging threat. Prioritize investigation of any alerts and correlate with threat intelligence.
Events for file system activity including creation, modification, and deletion.
detection:
selection_img:
Image|endswith:
- '\node.exe'
- '\powershell.exe'
selection_fils:
- TargetFilename:
- 'C:\ProgramData\wt.exe'
- 'C:\ProgramData\system.bat'
- TargetFilename|contains|all:
- 'C:\Users\'
- '\AppData\Local\Temp\6202033.vbs'
- TargetFilename|contains|all:
- 'C:\Users\'
- '\AppData\Local\Temp\6202033.ps1'
condition: all of selection_*Highly unlikely
Tactics
Sub-techniques
Other