NPM Supply Chain Attacks Hit Businesses in 2026: Axios, Bitwarden CLI, and SAP Compromised

Three major npm supply chain attacks compromised Axios, Bitwarden CLI, and SAP packages in 2026. Learn how NC small businesses can detect and defend against software supply chain threats.

Cover Image for NPM Supply Chain Attacks Hit Businesses in 2026: Axios, Bitwarden CLI, and SAP Compromised

TL;DR: Three major npm supply chain attacks rocked the software ecosystem in 2026, including the Axios compromise (March 31), the Mini Shai-Hulud SAP package worm (April 29), and the Bitwarden CLI poisoning (April 22). With axios alone receiving over 100 million weekly downloads, even small businesses that never write code are exposed through SaaS vendors and managed software. North Carolina businesses need vendor risk programs, dependency monitoring, and managed cybersecurity to detect compromises that the package registries themselves cannot.

Microsoft Security attributed the March 31, 2026 Axios npm compromise to Sapphire Sleet, a North Korean state-sponsored actor. Two malicious versions (1.14.1 and 0.30.4) injected a fake dependency named [email protected] that downloaded a remote access trojan tailored to Windows, macOS, and Linux. Less than four weeks later, The Hacker News reported the Mini Shai-Hulud campaign weaponizing SAP-related npm packages with credential-stealing preinstall scripts that harvest GitHub, npm, and major cloud provider secrets.

Key takeaway: Most North Carolina small businesses do not write JavaScript. They still depend on it. Every SaaS application, internal tool, and managed software platform built on Node.js inherits the same npm supply chain risk. Defense requires visibility into your software vendors and a managed security partner who watches the registries on your behalf.

Worried your software vendors were affected? Preferred Data Corporation provides vendor risk assessments and managed cybersecurity for North Carolina businesses. BBB A+ rated since 1987. Call (336) 886-3282 or request a security assessment.

What is an npm supply chain attack?

An npm supply chain attack occurs when a threat actor publishes a malicious version of a trusted JavaScript package to the npm registry, typically by stealing maintainer credentials or compromising a package author's machine. Any developer or build pipeline that pulls the new version automatically inherits the malicious code, often with no visible warning.

According to Palo Alto Networks Unit 42, the npm registry now hosts over 3 million packages and processes more than 200 billion downloads each month. That scale makes npm the most attractive supply chain target for nation-state actors, ransomware crews, and credential thieves.

Three patterns dominated 2026 attacks:

  1. Maintainer account takeover through phishing or token theft, used to push trojaned versions
  2. Preinstall script execution, where malicious code runs automatically on npm install
  3. Self-propagating worms that backdoor every package the victim's account can publish

How did the 2026 axios npm compromise unfold?

Microsoft Security confirmed that on March 31, 2026, axios maintainers identified two malicious versions (1.14.1 and 0.30.4) published to npm through a compromised account. The trojaned packages auto-installed [email protected], which delivered an OS-specific remote access trojan from a command-and-control server.

DetailAxios npm compromise
Discovery dateMarch 31, 2026
Malicious versions1.14.1 and 0.30.4
Safe versions1.14.0 and 0.30.3
Injected dependency[email protected]
PayloadOS-specific RAT (Win/Mac/Linux)
AttributionSapphire Sleet (North Korea)
Removal timeApproximately 3 hours
Weekly downloads of axios100M+ per npm

Even with the rapid takedown, exposure across CI/CD pipelines, developer laptops, and production deployments was global. GitGuardian documented that compromise patterns now hit npm, PyPI, and Docker Hub simultaneously, broadening the blast radius beyond JavaScript to Python and container ecosystems.

What was the Bitwarden CLI compromise?

The Bitwarden CLI compromise was a brief but high-impact npm poisoning event between 5:57 PM and 7:30 PM EST on April 22, 2026. According to Cyber Unit, the malicious @bitwarden/[email protected] package executed a multi-stage payload that exfiltrated credentials from cloud providers and CI/CD systems, then self-propagated by backdooring every npm package the victim could publish.

The Bitwarden compromise was particularly damaging because it weaponized a security tool that businesses use specifically to protect credentials. Any DevOps pipeline, automation script, or developer workstation that pulled the poisoned version during the 90-minute window was exposed to credential theft and lateral compromise across cloud providers including AWS, Azure, GCP, and GitHub.

The Hacker News detailed how the worm "self-propagates by backdooring every npm package the victim can publish," turning each compromised maintainer into a launchpad for the next wave of infections.

What is the Mini Shai-Hulud SAP attack?

Mini Shai-Hulud is a credential-stealing supply chain campaign that compromised multiple SAP-related npm packages on April 29, 2026. According to Wiz, the operation "injects malicious preinstall scripts that execute during dependency installation, leveraging a multi-stage payload to harvest developer and CI/CD secrets across GitHub, npm, and major cloud providers."

For North Carolina manufacturers running SAP or integrating SAP with custom applications, Mini Shai-Hulud represents a serious risk to ERP integration projects and the proprietary data that flows through them. PDC's custom software development and managed IT teams work with manufacturers to apply the same dependency hygiene controls used by Fortune 500 security teams.

Why does this affect small businesses that don't write code?

Most small businesses in High Point, Greensboro, Charlotte, and Raleigh never run npm install directly. They are still exposed through three indirect paths:

  1. SaaS vendors. Every CRM, accounting platform, ERP, and HR tool you use is built on top of open-source dependencies. If your vendor pulls a trojaned package into a release, your data and credentials may be exposed before the registry takedown.
  2. Internal web applications. Any custom intranet, customer portal, or marketing site built with Node.js inherits npm supply chain risk through the agency or developer that maintains it.
  3. Managed service providers. Many MSP platforms, RMM tools, and IT automation suites are themselves npm-dependent. A compromised MSP toolchain can propagate to every customer the MSP serves.

According to StationX, 43% of cyberattacks target small businesses, yet only 14% are prepared to defend themselves. Software supply chain attacks are particularly difficult for SMBs to detect because the malicious code arrives through the same trusted vendor relationships used to deliver legitimate updates.

How do npm supply chain attacks compare to traditional cyberattacks?

Attack typeInitial vectorDetection difficultyTime to impactTypical SMB defense
PhishingEmail link/attachmentMediumHours to daysMFA + email filtering
RansomwareCompromised endpointHighHoursEDR + immutable backups
BEC/Wire fraudSpoofed emailMediumHours to weeksDMARC + verification policy
Software supply chainTrusted updateVery highMinutesVendor risk + SBOM monitoring
Cloud account compromiseCredential theftHighMinutesMFA + conditional access

Software supply chain attacks are uniquely dangerous because the malicious code arrives signed by your trusted vendor and runs with the privileges that vendor already holds.

What can North Carolina businesses do today?

Defending against npm supply chain attacks requires visibility you cannot get from the registry itself. The five practical controls that matter most:

1. Pin your dependencies and disable auto-upgrades

Microsoft's incident guidance recommends "removing the ^ and ~ from package.json dependencies" to prevent automatic version pulls. This shifts new versions from automatic to deliberate, giving your team a window to confirm the release is legitimate.

2. Maintain a Software Bill of Materials (SBOM)

A SBOM is a machine-readable inventory of every package, library, and component in your software. The CISA Software Bill of Materials guidance treats SBOMs as foundational supply chain controls. For NC manufacturers pursuing CMMC compliance, SBOMs increasingly satisfy supply chain risk management requirements.

3. Rotate secrets after any compromise window

When a registry compromise is announced, every credential that could have been touched by the affected package must be rotated. This includes cloud provider API keys, GitHub tokens, npm tokens, and CI/CD secrets. Microsoft's Axios guidance was explicit: "Rotate all secrets and credentials."

4. Monitor your software vendors

Demand transparency from your SaaS vendors and MSP about their build pipeline security. Ask:

  • Do you publish an SBOM?
  • How are maintainer accounts protected (phishing-resistant MFA, hardware keys)?
  • What is your incident response plan for upstream package compromises?
  • Do you scan for known malicious packages in CI/CD?

PDC's vendor risk management program standardizes these questions across all of a client's vendors.

5. Deploy endpoint detection and response (EDR)

EDR platforms catch supply chain attacks at the runtime layer when registry-level controls fail. Behavioral detection sees the post-install RAT execute, even when the dependency itself looks legitimate. PDC's managed cybersecurity service deploys and tunes EDR for NC manufacturers and small businesses.

What about the bigger picture: who is targeting whom?

The 2026 npm wave reflects a broader shift in cyber-attacker economics. According to Chainalysis, initial access to a small business network now sells for as little as $439, and ransomware groups are increasingly outsourcing initial compromise to specialized brokers. Stealing developer tokens through npm is one of the cheapest ways to get that initial access at scale.

For NC manufacturers handling defense contracts, intellectual property, or customer PII, the threat model is even sharper. State actors like Sapphire Sleet specifically target tooling used by software-adjacent industries, including ERP integrators, custom application developers, and MSPs that serve manufacturing clients.

Key takeaway: You do not need to write code to be a victim of an npm supply chain attack. You only need to depend on software that does. Defense is a vendor management problem first and a technical problem second.

How Preferred Data Corporation helps

PDC has been protecting North Carolina manufacturers, construction firms, and professional services since 1987. For software supply chain risk, our team:

  • Reviews vendor security practices as part of every managed IT engagement
  • Monitors public CVEs and registry advisories so clients know within hours when their stack is affected
  • Deploys EDR and SOC monitoring that detects post-install RAT activity even when the dependency itself looks legitimate
  • Builds incident response runbooks specific to supply chain compromise scenarios
  • Supports CMMC supply chain requirements for defense contractors in the Piedmont Triad and Triangle

Worried about your software supply chain exposure?

Frequently Asked Questions

What was the axios npm supply chain compromise of 2026?

On March 31, 2026, attackers published two malicious versions of axios (1.14.1 and 0.30.4) to npm by compromising a maintainer account. The malicious versions injected a fake dependency, [email protected], which downloaded a remote access trojan to Windows, macOS, and Linux machines. Microsoft attributed the attack to North Korean state actor Sapphire Sleet. The packages were removed in roughly three hours, but exposure was global.

Was Bitwarden CLI compromised?

Yes. According to Cyber Unit, a malicious @bitwarden/[email protected] was distributed through npm between 5:57 PM and 7:30 PM EST on April 22, 2026. The poisoned package stole credentials from cloud providers and CI/CD systems, then self-propagated by backdooring other npm packages the victim could publish.

My business doesn't write software. Am I still at risk?

Yes. Most small businesses are exposed through three indirect paths: SaaS vendors that depend on npm, internal applications built by agencies or contractors, and MSP toolchains that include npm-based components. A compromise upstream of any of these vendors can reach your data and credentials.

How quickly should we respond to an npm supply chain advisory?

Within hours. The compromise window for these attacks is typically 90 minutes to a few hours, but exposure persists until every system that pulled the bad version is identified and remediated. Rotating affected credentials and verifying clean installations should begin the same day the advisory is published.

Does PDC monitor npm and other software registries?

Yes. As part of managed cybersecurity services, PDC tracks public advisories from CISA, npm, and major vendors so clients are notified within hours of any compromise that affects their stack. We also help clients build the SBOM and incident response runbooks needed for CMMC and cyber insurance requirements.

What is the difference between an npm attack and a regular cyberattack?

A typical cyberattack tries to break into your network from the outside. An npm supply chain attack delivers malicious code through an update from a trusted vendor that you already let inside. Detection requires monitoring vendor behavior and runtime activity, not just perimeter controls.


Support