T1195.001Compromise Software Dependencies and Development Tools
97%
“strong as our weakest link. supply chain attacks are lucrative to attackers as they offer mass distribution vectors, inherited and often escalated trust, persistence through normal operations, and delayed detection. this can be a serious headache for organizations and greatly inc…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
96%
“- rotate credentials exposed on affected systems ( api keys, tokens, environment variables ) near - term - hunt for indicators of compromise : - presence of : - plain - crypto - js - [ email protected ] - [ email protected ] - network traffic to : - sfrclak. com - 142. 11. 206. 7…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
95%
“delivered by trust : what the axios supply chain attack means for security leaders tldr ; the axios supply chain attack highlights how certain initial attack vectors are often overlooked and what security professionals can learn from them. this post explores how these attacks int…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
95%
“synthesized from microsoft technical research : - initial access : trusted maintainer account compromised through social engineering - publish : compromised packages published to npm through trusted account - install : malicious axios version is installed ( 1. 14. 1 or 0. 30. 4 )…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195Supply Chain Compromise
73%
“guarantees integrity. as organizations accelerate development through automation, ai, and rapid deployment practices, attackers are increasingly exploiting these trusted processes to distribute malicious code at scale. the axios incident underscores a broader reality : compromise…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
53%
“guarantees integrity. as organizations accelerate development through automation, ai, and rapid deployment practices, attackers are increasingly exploiting these trusted processes to distribute malicious code at scale. the axios incident underscores a broader reality : compromise…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1587Develop Capabilities
48%
“synthesized from microsoft technical research : - initial access : trusted maintainer account compromised through social engineering - publish : compromised packages published to npm through trusted account - install : malicious axios version is installed ( 1. 14. 1 or 0. 30. 4 )…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1587Develop Capabilities
42%
“delivered by trust : what the axios supply chain attack means for security leaders tldr ; the axios supply chain attack highlights how certain initial attack vectors are often overlooked and what security professionals can learn from them. this post explores how these attacks int…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.002Compromise Software Supply Chain
39%
“guarantees integrity. as organizations accelerate development through automation, ai, and rapid deployment practices, attackers are increasingly exploiting these trusted processes to distribute malicious code at scale. the axios incident underscores a broader reality : compromise…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.002Compromise Software Supply Chain
37%
“delivered by trust : what the axios supply chain attack means for security leaders tldr ; the axios supply chain attack highlights how certain initial attack vectors are often overlooked and what security professionals can learn from them. this post explores how these attacks int…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1587Develop Capabilities
36%
“strong as our weakest link. supply chain attacks are lucrative to attackers as they offer mass distribution vectors, inherited and often escalated trust, persistence through normal operations, and delayed detection. this can be a serious headache for organizations and greatly inc…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
A trusted package turned into an attacker’s gateway overnight. The Axios supply chain breach shows how quickly risk can spread—and why security leaders must rethink trust in modern development.