Security researchers have detected a sophisticated poisoning campaign targeting the Axios
npm package, the industry-standard HTTP client for Node.js. This attack bypasses traditional
security scans by utilizing a "delayed-payload" mechanism designed to infect developer
environments without leaving a trace in the build logs.
1. The "Hidden Dependency" Vector
The attackers did not modify the core Axios code directly. Instead, they published several
"typosquatted" versions and successfully compromised a minor sub-dependency used in
specific automated testing environments.
● The Injection: The malicious code was hidden within a post-install script. When npm
install was executed, the script checked for the presence of a .git directory—a
clear sign that the victim is a developer and not a production server.
● The Stealth Pivot: If a developer environment was detected, the script initiated a
second-stage download of a Remote Access Trojan (RAT) disguised as a harmless
telemetry update.
2. The Malware: A Custom "Node-RAT"
Unlike typical crypto-miners often found in poisoned packages, this campaign is focused on
Industrial Espionage.
● Credential Sniffing: Once installed, the RAT specifically hunts for .env files, AWS
credentials, and ~/.ssh keys.
● Memory Erasure: To avoid detection by local EDR (Endpoint Detection and Response)
tools, the malware executes entirely in memory. Once the sensitive data is exfiltrated to
a C2 (Command & Control) server, the malware deletes the installation artifacts, leaving
the developer's node_modules looking perfectly clean.
3. The "TeamPCP" Signature?
While attribution is ongoing, the obfuscation techniques and the focus on AWS secret exfiltration
bear the hallmarks of TeamPCP—the group recently linked to the European Commission
"Europa" breach. Their pivot from security scanners (Trivy) to development libraries (Axios)
suggests a broader campaign to harvest "Management-Level" API keys.