T1195.001Compromise Software Dependencies and Development Tools
97%
“malicious axios packages published to npm in new supply chain compromise the malicious axios versions do not contain malicious code within the axios source itself. instead, they introduce a fake dependency, plain - crypto - js @ 4. 2. 1, which is never imported by axios. its sole…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
91%
“products axios @ 1. 14. 1axios @ 0. 30. 4 recommended actions uninstall compromise packages or pin to known - good versions : axios @ 1. 14. 0 ( 1. x branch ) or axios @ 0. 30. 3 ( 0. x branch ). until patched releases are verified. truesec recommends that you disable “ postinsta…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1587Develop Capabilities
46%
“malicious axios packages published to npm in new supply chain compromise the malicious axios versions do not contain malicious code within the axios source itself. instead, they introduce a fake dependency, plain - crypto - js @ 4. 2. 1, which is never imported by axios. its sole…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
The malicious axios versions do not contain malicious code within the axios source itself. Instead, they introduce a fake dependency, [email protected], which is never imported /../