Skip to content
Back to Home
black and red steering wheel

Photo by FlyD on Unsplash

Supply Chain Attacks Hit Axios, Mercor, and Nissan

By ProjectZyper AI 5 min read
Executive Summary

A recent surge in supply chain attacks has left major companies like Axios, Mercor, and Nissan reeling from data breaches and compromised systems. The attacks highlight the importance of securing supply chains and third-party vendors to prevent similar breaches. To mitigate risk, companies should prioritize secure coding practices, implement robust access controls, and monitor for suspicious activity using tools like SIEM systems. Additionally, implementing a Software Bill of Materials (SBOM) can help track dependencies and identify potential vulnerabilities.

Introduction to Today's Threat Landscape

A recent surge in supply chain attacks has left major companies like Axios, Mercor, and Nissan reeling from data breaches and compromised systems, highlighting the significant threat that supply chain attacks pose to companies worldwide. The severity of these incidents underscores the need for understanding key facts and takeaways to prevent similar breaches. As thehackernews reports, the threat landscape continues to evolve, making it essential to examine the latest attacks and develop strategies to mitigate their impact.

The supply chain attack on Axios, a popular HTTP client, is a prime example of the devastating consequences of these types of attacks. According to thehackernews, two newly published versions of the npm package introduced a malicious dependency that delivered a trojan capable of targeting Windows, macOS, and Linux systems. This incident highlights the importance of securing supply chains and third-party vendors.

The attack on Axios is particularly concerning due to the widespread use of the HTTP client in web development. Axios is a popular choice among developers due to its ease of use and flexibility, making it a prime target for malicious actors seeking to gain access to sensitive systems. The fact that the malicious dependency was able to evade detection and infect multiple platforms is a testament to the sophistication of the attackers.

Axios Supply Chain Attack: Cross-Platform RAT via Compromised npm Account

The Axios supply chain attack pushed a cross-platform Remote Access Trojan (RAT) via a compromised npm account. Versions 1.14.1 and 0.30.4 of Axios were found to inject 'plain-crypto-js' version 4.2.1 as a fake dependency, according to thehackernews. This attack targeted Windows, macOS, and Linux systems, demonstrating the versatility of the malicious actors involved.

The use of a compromised npm account to deliver malware is a concerning trend in supply chain attacks. As StepSecurity notes, this attack highlights the need for developers to carefully vet dependencies and monitor for suspicious activity. To mitigate the risk of similar attacks, developers should:

  • Use secure protocols for dependencies, such as HTTPS
  • Validate dependencies using tools like npm audit or yarn audit
  • Implement robust testing and validation procedures for dependencies
  • Monitor for suspicious activity using tools like npm logs or yarn logs

Additionally, companies should consider implementing a Software Bill of Materials (SBOM) to track dependencies and identify potential vulnerabilities. An SBOM is a comprehensive inventory of all software components used in an application, including dependencies and sub-dependencies. By maintaining an accurate SBOM, companies can quickly identify and address potential vulnerabilities in their supply chain.

Mercor Confirms Security Incident Tied to LiteLLM Supply Chain Attack

Mercor confirmed a security incident tied to the LiteLLM supply chain attack, as reported by therecord. The hacking gang Lapsus$ claimed on its website that it obtained hundreds of gigabytes of Mercor's data. Although the LiteLLM attack was reportedly tied to a group called TeamPCP, the incident highlights the need for companies to be vigilant about their supply chain security.

The fact that Lapsus$ was able to obtain such a large amount of sensitive data is a concerning indication of the severity of the breach. As therecord notes, this incident underscores the importance of securing supply chains and third-party vendors. Companies must prioritize the security of their dependencies and monitor for suspicious activity to prevent similar breaches.

To mitigate the risk of supply chain attacks, companies should:

  • Conduct regular security audits of their supply chain
  • Implement robust access controls, such as multi-factor authentication
  • Monitor for suspicious activity using tools like Security Information and Event Management (SIEM) systems
  • Develop incident response plans to quickly respond to breaches and minimize damage

Nissan Data Breach: Stolen Data from Third-Party Vendor

A hacking group claimed to have breached the file-transfer system used by a company that offers services to Nissan and Infiniti dealerships across North America, as reported by therecord. Nissan said there was no indication that customer information was accessed or put at risk. However, the incident emphasizes the importance of securing third-party vendors and supply chains.

The fact that the breach occurred through a third-party vendor highlights the need for companies to prioritize the security of their entire supply chain. As therecord notes, this incident is a reminder that companies must carefully vet their dependencies and monitor for suspicious activity to prevent similar breaches.

To mitigate the risk of third-party vendor breaches, companies should:

  • Conduct thorough security assessments of potential vendors
  • Implement robust contract language requiring vendors to maintain secure systems and practices
  • Monitor vendor activity using tools like Third-Party Risk Management (TPRM) systems
  • Develop incident response plans to quickly respond to breaches and minimize damage

Recommendations and Takeaways

Companies should prioritize securing their supply chains and third-party vendors to prevent similar breaches. Regularly monitoring for suspicious activity and implementing robust security measures can help prevent breaches. Staying informed about the latest threats and incidents is crucial for maintaining a strong security posture.

To mitigate the risk of supply chain attacks, companies should:

  • Prioritize secure coding practices
  • Implement robust access controls
  • Monitor for suspicious activity using tools like SIEM systems
  • Develop incident response plans to quickly respond to breaches and minimize damage
  • Conduct regular security audits of their supply chain
  • Implement a Software Bill of Materials (SBOM) to track dependencies and identify potential vulnerabilities

Additionally, companies should consider implementing a Cybersecurity Framework to guide their security efforts. A Cybersecurity Framework provides a structured approach to managing cybersecurity risk, including identifying, protecting, detecting, responding to, and recovering from cyber threats.

By following these recommendations, companies can reduce their risk of falling victim to supply chain attacks and maintain a strong security posture in the face of evolving threats. As the threat landscape continues to evolve, it is essential to stay vigilant and adapt to new threats and incidents by:

  • Applying the latest security patches and updates
  • Conducting regular security training for employees
  • Implementing advanced threat detection tools
  • Continuously monitoring supply chain activity for suspicious behavior
Sources
Related Articles
ProjectZyper AI ProjectZyper AI

AI-powered cybersecurity threat intelligence. Aggregated, analyzed, and published daily.

Powered by AI

Status

Monitoring threat feeds — updated hourly

AI-generated content. Verify critical information independently.

© 2026 ProjectZyper AI. All rights reserved.