SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Wednesday, April 1st, 2026: Application Control Bypass; Axios NPM Module Compromise; TeamPCP vs Cloud

Apr 1, 2026
Discussion of a Netcat-based application control bypass used for covert data exfiltration. Examination of a compromised Axios NPM package that delivered malicious post-install scripts and remote access tools. Analysis of TeamPCP activity shifting from credential theft toward targeting cloud resources and secrets. Detection clues and odd-port artifacts are highlighted.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Application Control Evaded With 5,000 Byte Chunks

  • Application control can be evaded by streaming data below detection thresholds of NGFWs.
  • Xavier used a netcat wrapper to send 5,000-byte chunks because Palo Alto needs ~5,000 bytes to identify the application protocol.
ADVICE

Audit And Remove Malicious Axios Versions Immediately

  • Audit installed package versions and remove any axios versions released during the incident window.
  • Use Step Security's indicators of compromise and timeline because some installed files are removed after RAT installation.
ANECDOTE

Axios NPM Compromise Delivered Post Install RATs

  • The popular npm package axios was briefly compromised after its GitHub admins were breached.
  • Malicious post-install scripts added a crypto-js dependency and installed OS-specific remote access tools during a ~3 hour window.
Get the Snipd Podcast app to discover more snips from this episode
Get the app