Wave of Supply Chain Attacks Compromises Critical Open-Source Developer Tools

Open Source Under Siege: Axios, Trivy, and LiteLLM Hit by Supply Chain Attacks

HIGH
April 10, 2026
April 29, 2026
5m read
Supply Chain AttackMalwareThreat Actor

Impact Scope

Affected Companies

OpenAICheckmarx

Industries Affected

Technology

Related Entities(initial)

Threat Actors

TeamPCPUNC6780

Organizations

CheckmarxGoogle Threat Intelligence Group

Products & Tech

AxiosTrivyKICSLiteLLMnpm

Other

SANDCLOCKOpenAI

Full Report(when first published)

Executive Summary

The open-source software ecosystem has been targeted by a wave of high-impact supply chain attacks, compromising critical developer tools and creating cascading risks for downstream users. In late March and early April 2026, several popular projects were poisoned, including the Axios JavaScript library, the Trivy vulnerability scanner, and AI gateway LiteLLM. In the Axios incident, a suspected North Korean threat actor compromised a maintainer's npm account to publish malicious versions of the library, forcing consumers like OpenAI to rotate security certificates. In a separate campaign, a group known as TeamPCP (or UNC6780) deployed SANDCLOCK malware to steal CI/CD secrets from developers contributing to Trivy. The attackers then used these stolen credentials to compromise other projects that used Trivy in their build pipelines, highlighting a strategic focus on attacking the automated software development lifecycle itself.

Threat Overview

These incidents represent a strategic shift by threat actors to target the software supply chain at its source. Instead of attacking end-user organizations directly, they are compromising the very tools developers use, poisoning the well for thousands of downstream projects and companies.

Axios Incident (March 31, 2026)

  • Target: The axios package on the npm registry, a JavaScript library with ~100 million weekly downloads.
  • Attacker: Suspected North Korean state-sponsored actor (per Google's Threat Intelligence Group).
  • Vector: The attacker compromised the npm account of a project maintainer, likely via credential theft or session hijacking (T1078 - Valid Accounts).
  • Action: The attacker published malicious versions of Axios (e.g., v1.14.1) containing credential-stealing malware.
  • Impact: Any developer or CI/CD pipeline that pulled the malicious version during the compromise window was affected. OpenAI confirmed its macOS app-signing workflow downloaded a malicious version, prompting them to revoke and rotate certificates as a precaution.

Trivy/SANDCLOCK Incident (March-April 2026)

  • Target: Developers and CI/CD environments associated with the Trivy vulnerability scanner.
  • Attacker: Cybercriminal group TeamPCP (UNC6780).
  • Vector: The group deployed a credential-stealing malware named SANDCLOCK.
  • Action: SANDCLOCK was designed to extract sensitive data from developer environments, including CI/CD environment variables, cloud credentials (AWS, GCP), and Kubernetes configuration files.
  • Cascading Impact: Using secrets stolen from the Trivy compromise, TeamPCP then pivoted to attack other open-source projects that used Trivy in their development pipelines, such as KICS and LiteLLM. They injected malware into these projects, propagating the compromise down the supply chain.

Technical Analysis

These attacks highlight a focus on CI/CD pipelines as a primary target.

  • Credential Theft is Key: Both attacks hinged on obtaining legitimate credentials—an npm account for Axios, and CI/CD secrets for Trivy. This allows attackers to perform actions that appear legitimate, bypassing many security controls.
  • Abuse of Package Managers: The Axios attack demonstrates the risk of package manager repositories like npm. A single compromised maintainer account can be used to distribute malware to millions of users.
  • Targeting the Pipeline: The TeamPCP campaign shows a deep understanding of modern software development. By stealing CI/CD secrets (T1552.006 - Unsecured Credentials: CI/CD Secrets), they can gain privileged access to code repositories, artifact registries, and cloud environments, allowing them to inject malicious code at multiple points in the development lifecycle.

MITRE ATT&CK Mapping

Impact Assessment

The impact of these attacks is systemic and far-reaching.

  • Erosion of Trust: These incidents erode trust in the open-source ecosystem, which is the foundation of modern software development.
  • Widespread Potential Compromise: Given the popularity of tools like Axios and Trivy, thousands of organizations may have unknowingly incorporated malicious code into their products or been exposed to credential theft.
  • Costly Remediation: Downstream victims like OpenAI must engage in costly and time-consuming remediation efforts, such as rotating certificates, scanning codebases, and investigating potential breaches.
  • Demonstration of Cascading Risk: The Trivy incident is a perfect example of a cascading failure, where the compromise of one component leads to the compromise of many others that depend on it.

Cyber Observables for Detection

Type
log_source
Value
CI/CD Pipeline Logs
Description
Look for build steps that download unexpected package versions or execute suspicious commands.
Context
Jenkins, GitLab CI, GitHub Actions logs.
Confidence
medium
Type
command_line_pattern
Value
env or printenv
Description
Attackers often run these commands in a compromised CI/CD environment to dump all environment variables and secrets.
Context
CI/CD pipeline execution logs.
Confidence
high
Type
network_traffic_pattern
Value
Outbound traffic from build agents
Description
Monitor for build agents making network connections to unknown or suspicious domains, which could indicate C2 or data exfiltration.
Context
Egress firewall logs, VPC flow logs.
Confidence
medium

Detection & Response

  1. Software Bill of Materials (SBOM): Maintain a detailed and up-to-date SBOM for all applications to quickly identify if a compromised package version (like the malicious Axios release) is in use.
  2. CI/CD Log Monitoring: Ingest and analyze CI/CD pipeline logs in a SIEM. Alert on suspicious commands, access to secret stores, or anomalous network activity from build agents. This is an application of D3-PA: Process Analysis to the build environment.
  3. Dependency Pinning: Pin all software dependencies to specific, known-good versions. Use a lockfile (package-lock.json, yarn.lock) and verify its integrity. Alert on any builds that attempt to use a different version.

Mitigation

Securing the software supply chain requires a multi-layered approach.

  1. Enforce MFA for Developers: All developer accounts with access to code repositories, package managers (npm, PyPI), and CI/CD systems must be protected with phishing-resistant MFA. This is a critical control, as per M1032 - Multi-factor Authentication.
  2. Least Privilege in CI/CD: CI/CD jobs should run with the minimum permissions necessary. Use short-lived, single-purpose credentials instead of long-lived static secrets wherever possible. This aligns with M1026 - Privileged Account Management.
  3. Vet Dependencies: Use vulnerability scanning tools (like a trusted version of Trivy) and services like Snyk or Dependabot to scan dependencies for known vulnerabilities and malicious code.
  4. Isolate Build Environments: Run CI/CD jobs in ephemeral, isolated environments with no access to the broader corporate network. The network access for build agents should be strictly controlled and monitored.

Timeline of Events

1
March 31, 2026
An attacker compromises an Axios maintainer's npm account and publishes malicious versions of the library.
2
April 1, 2026
TeamPCP group begins targeting Trivy developers with SANDCLOCK malware, leading to cascading compromises of KICS and LiteLLM.
3
April 10, 2026
OpenAI announces it is revoking macOS app certificates as a precaution after its build systems downloaded a malicious version of Axios.
4
April 10, 2026
This article was published

Article Updates

April 29, 2026

Checkmarx confirms data theft, source code leak by Lapsus$ following Trivy-linked supply chain attack; Bitwarden also impacted.

MITRE ATT&CK Mitigations

Enforce strong, phishing-resistant MFA on all developer accounts, especially for code repositories and package manager registries.

Mapped D3FEND Techniques:

Apply least privilege principles to CI/CD pipelines, using short-lived, narrowly-scoped credentials instead of static, over-privileged secrets.

Strictly control and monitor outbound network access from build environments to prevent data exfiltration and C2 communication.

Use dependency pinning and lockfiles to ensure that builds use only specific, vetted versions of third-party libraries.

D3FEND Defensive Countermeasures

The compromise of the Axios maintainer's npm account underscores the absolute necessity of enforcing Multi-factor Authentication for all individuals involved in the software supply chain. Development organizations must mandate the use of strong, phishing-resistant MFA (like FIDO2 security keys) for all accounts with publishing rights to package managers (npm, PyPI, etc.), access to source code repositories (GitHub, GitLab), and administrative access to CI/CD systems. This single control would have likely prevented the Axios incident, as the attacker would not have been able to publish the malicious package even with a stolen password. This is not just a recommendation for internal developers but should be a requirement for any open-source project an organization critically depends on.

To counter threats like SANDCLOCK within the build environment, organizations must apply Process Analysis to their CI/CD pipelines. This involves treating the build agent as a critical endpoint. Security teams should ingest CI/CD logs into a SIEM and create alerts for anomalous behavior. For example, a build script for a linter should not be spawning shell commands like env to dump secrets, nor should it be making outbound network connections to unknown domains. By baselining the expected behavior of build jobs (e.g., 'this job only runs npm install and npm test'), any deviation, such as the execution of curl or wget to download an external script, can be flagged as a high-confidence indicator of compromise. This provides a crucial detection layer within the automated pipeline itself.

Timeline of Events

1
March 31, 2026

An attacker compromises an Axios maintainer's npm account and publishes malicious versions of the library.

2
April 1, 2026

TeamPCP group begins targeting Trivy developers with SANDCLOCK malware, leading to cascading compromises of KICS and LiteLLM.

3
April 10, 2026

OpenAI announces it is revoking macOS app certificates as a precaution after its build systems downloaded a malicious version of Axios.

Sources & References(when first published)

Two different attackers poisoned popular open source tools
The Register (theregister.com) April 9, 2026
Our response to the Axios developer tool compromise
OpenAI (openai.com) April 10, 2026
Advisory on Securing the Software Supply Chain and Development Workflows
Cyber Security Agency of Singapore (CSA) (csa.gov.sg) April 9, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

supply chain attackopen sourceaxiostrivynpmci/cd securitysandclock

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.