Technical Analysis & Remediations
MITRE ATT&CK Mapping
T1195.001
(Supply Chain Compromise: Software Dependencies and Development Tools)
T1059
(Command and Scripting Interpreter)
T1082
(System Information Discovery)
CVE Profile
[N/A - Credential/Supply Chain Compromise]
[CISA KEV Status: Inactive/None]
Telemetry
Network (C2) hxxp://sfrclak[.]com:8000/6202033, 142.11.206.73, hxxp://callnrwise[.]com, 142.11.196.73, 142.11.199.73.
Network (User-Agent)
Hardcoded as "mozilla/4.0 (compatible; msie 8.0; windows nt 5.1; trident/4.0)".
File System (macOS Payload)
/Library/Caches/com.apple.act.mond (SHA256: 92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a).
File System (Windows Payload)
%TEMP%\6202033.ps1 (SHA256: 617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101).
File System (Linux Payload)
/tmp/ld.py.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
For environments utilized by software engineers and CI/CD pipelines.
GOVERN (GV) – Crisis Management & Oversight
Command
Initiate a major incident response protocol for software supply chain compromise. Notify development teams to freeze deployments containing axios.
DETECT (DE) – Monitoring & Analysis
Command
Query endpoint telemetry (EDR) for the execution of setup.js spawning child processes to download from packages.npm.org.
Command
Sweep internal networks for DNS requests resolving to sfrclak[.]com or callnrwise[.]com.
RESPOND (RS) – Mitigation & Containment
Command
Isolate all developer endpoints and CI/CD runners exhibiting the presence of plain-crypto-js in node_modules or the OS-specific RAT payloads.
Command
Downgrade to known-safe versions of Axios (1.14.0 or 0.30.3).
RECOVER (RC) – Restoration & Trust
Command
Treat isolated endpoints as fully compromised. Wipe and pave affected developer machines and ephemeral build containers.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Rotate all AWS, Azure, GCP, database, and API keys present in the environment variables of compromised hosts.
Command
Enforce --ignore-scripts globally in CI/CD pipelines to prevent arbitrary execution of postinstall hooks.
Remediation - THE HOME USER TRACK (Safety Focus)
Environmental Reality Check
Node.js and npm are developer tools and are NOT installed by default on Windows or macOS. The threat level for standard home users is
Conditional/Low.
Priority 1: Safety
Command
If you are not a software developer and do not have Node.js/npm installed, no action is required. Your system lacks the dependencies to execute this attack.
Command
If you are a developer who installed axios via npm on or after March 31, 2026, disconnect from the internet immediately to sever the C2 connection.
Priority 2: Identity
Command
Rotate your GitHub access tokens, SSH keys, and any personal cloud API keys stored on your development machine using a known clean device (e.g., your smartphone).
Priority 3: Persistence
Command
Check your system for the dropped artifacts. On macOS, inspect /Library/Caches/ for com.apple.act.mond. On Windows, check your %TEMP% directory for .ps1 files and startup folders for system.bat.
Hardening & References
Baseline
CIS Controls v8 - Control 2 (Software Asset Management) and Control 16 (Application Software Security).
Framework
NIST CSF 2.0 (PR.PS-01: Configuration Management / PR.DS-01: Data Security).
Insight
Supply chain attacks via package managers leverage the implicit trust developers place in automated dependency resolution. Enforcing strict lockfiles (package-lock.json), utilizing package hashes, and disabling installation scripts (npm config set ignore-scripts true) drastically reduces the attack surface against phantom dependencies like plain-crypto-js.
Source
Primary Intelligence Source (ThreatBook)