Threat IntelHIGH

Axios npm Supply Chain Attack - North Korean Threat Actor Strikes

Featured image for Axios npm Supply Chain Attack - North Korean Threat Actor Strikes
TETenable Blog
axiosUNC1069WAVESHAPER.V2npmsupply chain attack
🎯

Basically, a hacker tricked developers into downloading malicious software through a popular coding tool.

Quick Summary

A North Korean threat actor compromised the axios npm package, delivering a RAT to millions of developers. This incident highlights significant security risks in software supply chains. Immediate actions are recommended to mitigate potential impacts.

The Threat

On March 31, 2026, a significant supply chain attack targeted the axios npm package, a widely used tool with over 100 million weekly downloads. The attack was attributed to UNC1069, a North Korea-nexus threat actor known for financially motivated cyber activities. This breach allowed malicious versions of axios to deliver a cross-platform remote access trojan (RAT) to potentially millions of developer environments within a mere three-hour window.

The malicious versions, 1.14.1 and 0.30.4, were published after the attacker compromised the maintainer's account. By injecting a malicious dependency called plain-crypto-js, the attacker effectively turned a trusted package into a delivery vehicle for malware. The rapid detection of this compromise highlights both the threat's urgency and the need for robust security measures in software development.

Who's Behind It

The Google Threat Intelligence Group (GTIG) has linked this attack to UNC1069, which has been active since at least 2018. This group has a history of targeting open-source ecosystems, leveraging their popularity to spread malware. The attack's sophistication is evident in the method used to publish the malicious packages, bypassing standard security protocols that typically safeguard against unauthorized releases.

GTIG's analysis indicates that the attacker utilized a long-lived npm access token to publish the malicious versions, which lacked the usual trusted publisher signatures. This oversight allowed the attacker to exploit the system, raising alarms about the security of npm packages and the potential for similar attacks in the future.

Tactics & Techniques

The malicious axios versions executed a postinstall hook that activated an obfuscated JavaScript file, leading to the deployment of the WAVESHAPER.V2 backdoor. This backdoor is capable of running on macOS, Windows, and Linux, showcasing the attack's cross-platform capabilities. Each variant of the malware is designed to blend in with legitimate system processes, making detection challenging.

For instance, on Windows, the malware masquerades as a legitimate application, while on macOS, it installs itself in a way that mimics system cache files. This tactic not only ensures persistence but also complicates forensic analysis post-infection, as the malware cleans up after itself to avoid detection.

Defensive Measures

In light of this attack, developers and organizations using axios are urged to take immediate action. The malicious versions have been removed from the npm registry, but those who installed them should treat their systems as fully compromised. Recommended steps include:

  • Rotate all credentials and secrets associated with affected systems.
  • Rebuild from clean snapshots to ensure no remnants of the malware remain.
  • Audit CI/CD pipelines to prevent future compromises.
  • Block known command-and-control (C2) traffic associated with the attack.

Additionally, implementing version cooldown policies in package managers can help mitigate the risks of future supply chain attacks. This incident serves as a stark reminder of the vulnerabilities present in widely used software packages and the importance of vigilance in cybersecurity practices.

🔒 Pro insight: This incident underscores the vulnerabilities in open-source ecosystems, necessitating enhanced security protocols for package management.

Original article from

TETenable Blog· Research Special Operations
Read Full Article

Related Pings

HIGHThreat Intel

Supply Chain Attack - Axios npm Package Compromised

A major supply chain attack targeted the Axios npm package, affecting millions of applications. Malicious versions were published, risking user data and system integrity. Organizations must act quickly to mitigate the impact and secure their environments.

Arctic Wolf Blog·
HIGHThreat Intel

STARDUST CHOLLIMA - Compromises Axios npm Package

A serious security breach has compromised the Axios npm package, affecting countless developers. This incident highlights the vulnerabilities in software supply chains, especially for cryptocurrency users. Action is needed to safeguard against these sophisticated attacks.

CrowdStrike Blog·
HIGHThreat Intel

Axios Supply Chain Attack - How It Was Detected

A major supply chain attack on Axios was detected using a proof of concept tool. This incident highlights vulnerabilities in package management systems and the need for better security measures. Swift action was taken to mitigate the damage and protect users.

Elastic Security Labs·
HIGHThreat Intel

Axios npm Supply Chain Attack - Mitigation Steps Explained

Axios experienced a serious supply chain attack linked to North Korea's Sapphire Sleet. Countless users who downloaded the malicious npm packages are at risk. Immediate actions are necessary to secure affected systems and prevent further exploitation.

Microsoft Security Blog·
HIGHThreat Intel

Iran Cyber Campaign - North Korea Targets Axios NPM Package

Iran's cyber campaign intensifies, targeting U.S. interests. North Korea compromises the Axios NPM package, raising serious supply chain concerns. Organizations must act swiftly to bolster defenses.

CyberWire Daily·
HIGHThreat Intel

Mercor Confirms Security Incident from LiteLLM Supply Chain Attack, Data Stolen

Mercor confirms it was impacted by the LiteLLM supply chain attack, with significant data theft reported by the extortion group Lapsus$.

The Record·