Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Google attributes Axios npm supply chain attack to North Korean group UNC1069

PFAS crisis in Flanders (Belgium): butterfly effect

European Chip Law Design Enablement Team

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Google attributes Axios npm supply chain attack to North Korean group UNC1069
Identity

Google attributes Axios npm supply chain attack to North Korean group UNC1069

By April 1, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananApril 1, 2026Threat Intelligence/Software Security

Google has officially attributed a supply chain breach of the popular Axios npm package to a cluster of financially motivated North Korean threat operations tracked as UNC1069.

“We believe this attack was the work of a suspected North Korean threat actor, which we track as UNC1069,” John Hultquist, principal analyst at Google Threat Intelligence Group (GTIG), told The Hacker News in a statement.

“North Korean hackers have deep experience with supply chain attacks, which they have historically used to steal cryptocurrencies. The full extent of this incident is still unknown, but given the popularity of the compromised packages, we expect it to have far-reaching impact.”

This development comes after threat actors pushed out two trojanized versions 1.14.1 and 0.30.4 that introduced a malicious dependency named “plain-crypto-js” that was used to seize control of package administrators’ npm accounts and provide a cross-platform backdoor that could infect Windows, macOS, and Linux systems.

Rather than introducing code changes to Axios, this attack leverages post-installation hooks in the malicious dependency’s “package.json” file to achieve stealth execution. Once a compromised Axios package is installed, npm automatically triggers malicious code execution in the background.

Specifically, the “plain-crypto-js” package acts as a “payload delivery vehicle” for an obfuscated JavaScript dropper called SILKBELL (“setup.js”) that retrieves the appropriate next stage from a remote server based on the victim’s operating system.

As previously detailed on The Hacker News, the Windows execution branch delivers PowerShell malware, C++ Mach-O binaries for macOS, and Python backdoors for Linux systems. The dropper also performs a cleanup to remove itself and replace the “package.json” file of the “plain-crypto-js” package with a clean version that does not have post-installation hooks.

Image source: Elastic Security Labs

The backdoor, codenamed WAVESHAPER.V2, is assessed to be an updated version of WAVESHAPER, a C++ backdoor introduced by UNC1069 in attacks targeting the cryptocurrency sector. This threat actor has been active since 2018. The link between supply chain attacks and UNC1069 was first reported by Elastic Security Labs due to functional overlap.

The three WAVESHAPER.V2 variants support four different commands and send beacons to a command and control (C2) server at 60 second intervals.

kill terminates the malware execution process. rundir enumerates a list of directories with file paths, sizes, and creation/modification timestamps. runscript: Runs an AppleScript, PowerShell, or shell command based on your operating system. peinject, decode and execute arbitrary binaries.

“WAVESHAPER.V2 is a direct evolution of WAVESHAPER, the macOS and Linux backdoor previously identified as the source of UNC1069,” Mandiant and GTIG said. “While the original WAVESHAPER uses a lightweight raw binary C2 protocol and employs code packing, WAVESHAPER.V2 communicates using JSON, collects additional system information, and supports more backdoor commands.”

“Despite these upgrades, both versions dynamically accept C2 URLs via command-line arguments, share identical C2 polling behavior and uncommon user agent strings, and deploy secondary payloads to the same temporary directory (for example, /Library/Caches/com.apple.act.mond).”

To mitigate this threat, users can audit the dependency tree for compromised versions (downgrading to a safe version if found), pin Axios to a known safe version in the ‘package-lock.json’ file to prevent accidental upgrades, check for the presence of ‘plain-crypto-js’ in ‘node_modules’, terminate malicious processes, and block C2 domains (‘sfrclak’). We recommend that you do so.[.]com,”IP address: 142.11.206[.]73), isolate the affected system and rotate all credentials.

“The Axios attack should be understood as a template rather than a one-time event. The level of operational sophistication documented here, including compromised maintainer credentials, a pre-staged payload built for three operating systems, both release branches hitting within 40 minutes, and built-in forensic self-destruct capabilities, reflects the threat actor planning this as a scalable operation,” ReversingLabs said. Tomislav Pelicin, chief software architect at , told The Hacker News.

“If this campaign is now appearing on PyPI and NuGet, that is consistent with what the attack mechanisms are already suggesting. The goal was to maximize developer reach. Organizations should audit not just their npm dependencies, but all package managers that feed their build pipelines, and treat secrets exposed in affected environments as compromised, regardless of which registry was accessed.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePFAS crisis in Flanders (Belgium): butterfly effect

Related Posts

Claude code source leaked via npm packaging error, confirmed by Anthropic

April 1, 2026

Android developer verification rollout begins ahead of September enforcement

March 31, 2026

TrueConf zero-day exploited to attack Southeast Asian government networks

March 31, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Google attributes Axios npm supply chain attack to North Korean group UNC1069

PFAS crisis in Flanders (Belgium): butterfly effect

European Chip Law Design Enablement Team

Fermilab’s electron beam technology tackles PFAS contamination

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.