Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. plain-crypto-js
  4. ›
  5. GMS-2026-69

GMS-2026-69: Embedded Malicious Code deploying cross-platform remote access trojan

March 31, 2026

The npm package plain-crypto-js version 4.2.1 is a malicious package published as part of the axios supply chain attack on March 31, 2026. It was injected as a hidden dependency into compromised axios versions (1.14.1 and 0.30.4). The package is never imported in axios source code and exists solely to execute a malicious postinstall script that contacts a C2 server at sfrclak[.]com and downloads a platform-specific RAT payload. On macOS it drops /Library/Caches/com.apple.act.mond, on Windows %PROGRAMDATA%\wt.exe, and on Linux /tmp/ld.py. After execution, the dropper deletes itself and replaces its package.json with a clean stub to hinder forensic analysis. Version 4.2.0 was a clean decoy used to establish publishing history.

References

  • github.com/advisories/GHSA-fw8c-xr5c-95f9
  • github.com/axios/axios/issues/10604
  • socket.dev/blog/axios-npm-package-compromised
  • www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan

Code Behaviors & Features

Detect and mitigate GMS-2026-69 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 4.2.0 up to 4.2.1

Solution

Remove the package entirely. This package is malware and has no legitimate use. Treat affected systems as fully compromised and rotate all credentials.

Weakness

  • CWE-506: Embedded Malicious Code

Source file

npm/plain-crypto-js/GMS-2026-69.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 31 Mar 2026 12:19:57 +0000.