Axios NPM Supply-Chain Hit: Microsoft Warns CI Users

What happened: Microsoft published guidance for Azure Pipelines customers after malicious versions of Axios (1.14.1 and 0.30.4) briefly landed on npm with a hidden dependency that ran on install and pulled down a second-stage payload from attacker infrastructure.

Why it matters: CI/CD is basically “auto-run strangers’ code at scale,” and package managers are the delivery truck. If a pipeline run installed the compromised versions, any secrets available to that job—service connections, tokens, deployment creds—should be treated as potentially exposed.

Wider context: Microsoft emphasizes this was not a compromise of Azure Pipelines itself; the risk comes from customer-defined workflows that install third-party dependencies. The guidance focuses on rebuilding agents, rotating credentials, and making installs deterministic (lockfiles, pinning, npm ci).

Background: Microsoft-hosted agents run each job on a freshly provisioned VM that’s discarded afterward, but self-hosted agents, custom scripts, third-party extensions, containers, and cached dependencies can persist the blast radius. Microsoft also calls out indicators like plain-crypto-js@4.2.1 and network links to sfrclak[.]com and 142.11.206.73:8000.


Singularity Soup Take: The supply-chain tax isn’t just “patch faster,” it’s “stop handing your build secrets to whatever npm feels like today.” If your pipeline can install a backdoored library in one run, you don’t have CI—you have an automated credential-leaking competition with a scoreboard.

Key Takeaways:

  • Affected Versions: Microsoft’s post highlights This email address is being protected from spambots. You need JavaScript enabled to view it..1 and This email address is being protected from spambots. You need JavaScript enabled to view it..4 as malicious, describing a hidden install-time dependency that contacted C2 to retrieve a second stage—meaning exposure can occur before your app code even runs.
  • Know Your Agent Type: The platform itself wasn’t compromised, and Microsoft-hosted agents are ephemeral per job, but self-hosted agents and containerized builds can retain poisoned caches and logs, so remediation may require rebuilding machines and clearing dependency caches.
  • Rotate And Rebuild: Microsoft advises reviewing pipeline logs for installs of axios or plain-crypto-js@4.2.1, checking for the listed IOCs (sfrclak[.]com, 142.11.206.73), and rotating any service-connection or deployment credentials available to affected runs—then rebuilding artifacts from clean inputs.