Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»North Korean hackers linked to Axios npm supply chain compromise
    Cybersecurity

    North Korean hackers linked to Axios npm supply chain compromise

    adminBy adminApril 2, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    North Korean hackers linked to Axios npm supply chain compromise
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The software supply chain attack that resulted in the compromise of npm packages of Axios, an extremely popular HTTP client library, is believed to be the work of financially-motivated North Korean attackers.

    Links to UNC1069

    On March 31, 2026, unknown attackers managed to publish two backdoored Axios npm packages after gaining access to a maintainer’s npm account.

    The malicious versions introduced a hidden dependency containing a post-install script, and this script executed automatically during installation and attempted to download and run additional payloads from the attacker-controlled infrastructure.

    The goal was to deploy malware capable of remote access and system compromise, potentially allowing attackers to steal sensitive data or move laterally within affected environments.

    The stealth and sophistication of the attack pointed to skilled attackers. The injected code was minimal and designed to evade detection and the malicious behavior was offloaded to the external dependency and remote payload, which made it harder for developers or automated tools to quickly identify the compromise.

    The attribution of the attack was made by Google Threat Intelligence Group (GTIG) researchers and Mandiant analysts, based on the backdoor that was deployed on victim systems and the command and control (C2) infrastructure used.

    “The platform-specific payloads ultimately deploy variants of a backdoor tracked by GTIG as WAVESHAPER.V2, a backdoor written in C++ that targets macOS to collect system information, enumerate directories, or execute additional payloads and that connects to the C2 provided via command-line arguments,” the researchers noted.

    Additional variants of WAVESHAPER.V2 have been written in PowerShell and Python to target Windows and Linux environments, respectively. The backdoor acts as a remote access trojan and is capable of system reconnaissance, file system enumeration, and code execution.

    Previous versions of the backdoor were used by a North Korea-nexus threat actor GTIG calls UNC1069, which has been active since at least 2018 and is known for targeting organizations to steal cryptocurrency.

    “Analysis of the C2 infrastructure (sfrclak[.]com resolving to 142.11.206.73) revealed connections from a specific AstrillVPN node previously used by UNC1069. Additionally, adjacent infrastructure hosted on the same ASN has been historically linked to UNC1069 operations,” they added.

    Further breaches expected

    The exposure window was short – the malicious Axios npm versions were available less than three hours before being removed – but even such a short-lived compromise is expected to have a wide impact.

    “This compromise is particularly significant because Axios is a widely used library and is often included as a transitive dependency across millions of applications,” noted Andres Ramos, Senior Threat Intelligence Researcher at Arctic Wolf.

    “Organisations that install npm packages in CI/CD pipelines may have automatically pulled the malicious versions into build environments during the ~3-hour window Even systems that did not directly install Axios could be indirectly impacted if another package in the environment depended on the compromised versions, highlighting the broader downstream risk across modern JavaScript ecosystems.”

    Various security companies have offered remediation advice for potentially affected developers and organizations, as well as threat detection rules, and advice aimed at preventing similar attacks affecting them in the future.

    Similarly, many companies have provided advice for those affected by the other supply chain attacks that happened in the last few days and targeted open-source projects like the Trivy security scanner, the LiteLLM library, and Telnyx on PyPI.

    Those attacks have all been attributed to the financially-motivated TeamPCP – or, as GTIG calls them, UNC6780 – and there’s reports that the secrets harvested in those attacks will be used by “partnering” groups like the Vect ransomware-as-a-service (RaaS) and extortion groups like Lapsus$.

    “Hundreds of thousands of stolen secrets could potentially be circulating as a result of these recent attacks. This could enable further software supply chain attacks, software as a service (SaaS) environment compromises (leading to downstream customer compromises), ransomware and extortion events, and cryptocurrency theft over the near term,” GTIG researchers warned.

    “Defenders should pay close attention to these campaigns, and enterprises should initiate dedicated efforts to assess the existing impact, remediate compromised systems, and harden environments against future attacks.”

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    Axios Chain Compromise hackers Korean linked North npm Supply
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleMy music sounded completely wrong until I turned off an audio setting I didn’t know was on
    Next Article Plex redesign comes to Fire TV, including remote streaming limits
    admin
    • Website

    Related Posts

    n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

    April 15, 2026

    Broadcom introduces zero-trust runtime for scalable AI agents

    April 15, 2026

    FCC exempts Netgear from foreign router ban

    April 15, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Walmart: Shopping & Savings 26.14 APK Download by Walmart

    April 15, 2026

    n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

    April 15, 2026

    Google rolls out worldwide agentic restaurant booking via AI Mode

    April 15, 2026

    Spotify, Bookshop expand to US, and ‘Page Match’ gets huge language support

    April 15, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,333)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (817)
    • Tech Tools & Mobile / Apps (1,595)
    • WiFi / Internet & Networking (224)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Walmart: Shopping & Savings 26.14 APK Download by Walmart

    April 15, 2026

    n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

    April 15, 2026

    Google rolls out worldwide agentic restaurant booking via AI Mode

    April 15, 2026
    Most Popular
    • Walmart: Shopping & Savings 26.14 APK Download by Walmart
    • n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails
    • Google rolls out worldwide agentic restaurant booking via AI Mode
    • Spotify, Bookshop expand to US, and ‘Page Match’ gets huge language support
    • Broadcom introduces zero-trust runtime for scalable AI agents
    • Large solar farms in the UAE may accidentally create rainstorms that could reshape how deserts manage water shortages
    • FCC exempts Netgear from foreign router ban
    • Google Is Replacing Dynamic Search Ads With AI Max
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.