You're running a SOC. It's early morning, and your console is filling up with alerts from the weekend. Somewhere in the stack, Microsoft Defender has flagged something as medium severity. Not critical. Not malicious. Just suspicious.
You've got dozens of alerts ahead of it. This one doesn't look urgent. It goes in the queue.
That's exactly what happened when the Axios npm package got compromised. And at multiple Dropzone customers, AI agents caught it before anyone had time to triage.
What Was the Axios Supply Chain Attack?
Axios is one of the most widely used JavaScript libraries for making HTTP requests, with over 83 million weekly downloads on npm.
On March 31, 2026, an attacker compromised the package in three steps, all within 39 minutes:
- Stole the credentials of a primary Axios maintainer
- Changed the account's registered email to a Proton Mail address under their control
- Published two backdoored versions (1.14.1 and 0.30.4) to npm
The malicious versions didn't modify Axios's own code. Instead, they injected a hidden dependency called plain-crypto-js that ran a postinstall script the moment npm install finished. No user interaction required.
That script downloaded a cross-platform Remote Access Trojan (RAT) tailored to the victim's operating system:
- Windows: A PowerShell-based RAT fetched and executed via a renamed copy of PowerShell
- macOS: A compiled C++ binary with significant overlap with WAVESHAPER, a backdoor attributed to North Korean-linked threat cluster UNC1069
- Linux: A Python RAT script executed via nohup for persistence
All three variants shared the same command-and-control (C2) protocol: system fingerprinting, 60-second command beaconing, arbitrary command execution, and file enumeration. The C2 server sat at sfrclak[.]com on port 8000.
Microsoft attributed the attack to Sapphire Sleet, a North Korean state actor. It was the most impactful npm supply chain attack since the ua-parser-js compromise in 2021, and a reminder that any dependency in your build pipeline is a potential attack surface.
The malicious versions were live for approximately three hours before npm pulled them. Three hours sounds like a small window. But for any organization that pulled the compromised version in that window, the RAT deployed immediately.
How Did Dropzone AI Surface the Axios Supply Chain Attack?
Microsoft Defender's detections fired. Across multiple Dropzone customer environments, alerts appeared identifying medium severity activity associated with an emerging threat actor. Microsoft was still working to provide additional context about the actor. The alerts weren't classified as malicious. They were flagged as medium severity.
Here's the problem: "medium severity" isn't "malicious." In a SOC processing hundreds of alerts, medium gets queued behind critical and high. It doesn't jump the line. It certainly doesn't get investigated first, especially outside business hours.
Dropzone's AI agents don't work that way. They don't triage by severity label. They investigate every alert with the same depth:
- Query across the integrated security stack
- Trace the full activity chain
- Build an evidence trail with every finding documented
- Deliver a verdict backed by the investigation
When the agents investigated these Defender alerts, they didn't stop at the severity classification. Here's what the full investigation looked like:
- Started with a Defender alert labeled medium severity
- Pulled endpoint telemetry and found a renamed PowerShell process running with a hidden window
- Traced the execution chain back to an npm postinstall script that shouldn't have been there
- Checked the destination URL against threat intelligence feeds and found multiple vendors had already flagged the domain as malicious
- Correlated the signals and confirmed suspicious behavior tied to known malicious infrastructure, upgrading the verdict to Malicious Urgent
Each step built on the last, the same way a senior analyst would work through it, but completing the investigation in minutes instead of hours. That's a correlation that detections and analytics alone can't make. It requires a deeper investigation.
This happened across multiple Dropzone customer environments. Same attack. Same detection gap where the alert severity didn't reflect the true threat. Same exposer by AI agents that don't sleep, don't deprioritize, and don't skip an alert because the queue is full.
What happens when a "medium" alert gets deprioritized?
It sits. Hours pass. Maybe a shift change happens. Maybe it gets bulk-closed during triage because the team is underwater.
Meanwhile, the Axios RAT was beaconing to its C2 server every 60 seconds. That interval wasn't idle. Each check-in gave the attacker the ability to run arbitrary commands, enumerate files, and map the compromised system.
Within the first few minutes, the RAT had already fingerprinted the operating system, user privileges, and network environment. Within the first hour, an attacker could have moved laterally, harvested credentials stored in environment variables or configuration files, and established secondary persistence that would survive the initial RAT being removed.
The alert was detected on time. The gap between "detected" and "investigated" is where real attacks live.
Why Does Every Alert Need a Full Investigation?
Security tools detect and classify based on signatures and known patterns. They're good at it. Microsoft Defender did its job: it saw the suspicious activity and fired an alert.
But detection and investigation are different problems.
- Detection asks: "Is something happening?"
- Investigation asks: "What's happening, how severe is it, and what do we do about it?"
A software supply chain attack is specifically designed to break the severity-label model. It arrives through trusted channels. A package your developers installed last month just updated, the way it does every month.
Nothing about the delivery mechanism looks unusual. The malicious payload hides behind a legitimate dependency name, runs during a normal install process, and establishes persistence before any detection tool has a signature for it.
That's why initial severity classifications miss these attacks. The detection layer sees individual signals. Something suspicious happened. A script executed. A network connection fired.
But no single signal screams "critical" on its own. The full picture only emerges when you investigate, when you trace the chain from the initial trigger through every subsequent action and correlate against known threat intelligence.
The Axios attack proved the point. A brand-new supply chain compromise through a trusted package doesn't trigger a "critical" label on day one. The only way to identify it is to investigate regardless of the label.
How does investigation change the outcome?
When AI agents run the full investigation regardless of classification, the severity label becomes an input, not a verdict. The investigation determines the real priority.
The organizations that caught the Axios compromise fastest weren't the ones with the best detection. They were the ones where every alert, regardless of how it was initially classified, got the same thorough investigation.
Key Takeaways
- Severity labels aren't verdicts. Microsoft Defender classified the Axios activity as medium severity. Dropzone's AI agents investigated and confirmed it was malicious.
- Supply chain attacks exploit trust. The Axios compromise weaponized a package with 83 million weekly downloads. No user interaction required for the RAT to deploy.
- Investigation closes the gap detection opens. Detection tells you something happened. Investigation tells you what, how bad, and what to do next.
- AI agents don't skip the queue. A "medium severity" alert gets the same investigation depth as a "critical" one.
- Point products can't keep up alone. Threats evolve faster than signatures. You need something that investigates across your full security stack the way an analyst would, 24/7.
- Speed matters. The Axios RAT beaconed every 60 seconds. Hours of queue time aren't neutral. They're exposure.
See how Dropzone investigates every alert, regardless of severity label. Request a demo.

.jpg)


