Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

UNC1069 Axios Maintainer social engineering led to npm supply chain attack

Why third-party risk is the biggest gap in clients’ security posture

New SparkCat variants of iOS, Android apps steal recovery phrase images from crypto wallets

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » UNC1069 Axios Maintainer social engineering led to npm supply chain attack
Identity

UNC1069 Axios Maintainer social engineering led to npm supply chain attack

By April 3, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananApril 3, 2026Threat Intelligence/Malware

The administrator of the Axios npm package acknowledged that the supply chain compromise was the result of a highly targeted social engineering campaign orchestrated by North Korean threat actors, tracked as UNC1069.

Administrator Jason Seman said the attackers first approached him posing as the founders of legitimate, well-known companies and then tailored their social engineering efforts “specifically towards me.”

“They were not only copying the company itself, but also the likeness of the founder,” Saiman said in a post-mortem of the case. “Then they invited me into a real Slack workspace, which was branded to the company’s CI and given a plausible name. [workspace] It was very well thought out. They had a channel to share their LinkedIn posts. ”

The attacker then allegedly scheduled a meeting with him on Microsoft Teams. When I joined the fake call, I received a fake error message that said, “Something on your system was not up to date.” As soon as the update began, the attack deployed a remote access Trojan.

The access granted by this Trojan allowed the attacker to steal the npm account credentials needed to publish two trojanized versions of the Axios npm package (1.14.1 and 0.30.4) containing an implant named WAVESHAPER.V2.

“Everything was very well-coordinated, looked legitimate and was done in a professional manner,” Saaiman added.

The attack chain described by the project administrator has extensive overlap with tradecraft related to UNC1069 and BlueNoroff. Details of this campaign were extensively documented last year by Huntress and Kaspersky, with the latter tracking it under the name GhostCall.

“Historically, […] “These particular guys are going after crypto founders, venture capitalists, everyday people. They do social engineering to take over accounts and then target the next round of people,” said security researcher Taylor Monaghan. Evolution to targeting [OSS maintainers] A little worrying in my opinion. ”

As a precaution, Saayman outlined several changes, including resetting all devices and credentials, setting immutable releases, adopting the OIDC flow for publishing, and updating GitHub Actions to adopt best practices.

This finding shows that open source project administrators are increasingly becoming targets of sophisticated attacks, effectively enabling attackers to target downstream users at scale by publishing poisoned versions of popular packages.

Since Axios attracts nearly 100 million downloads each week and is heavily used across the JavaScript ecosystem, the explosive scope for such supply chain attacks can be huge as they propagate quickly through direct and transitive dependencies.

“The compromise of a widely used package like Axios shows how difficult it is to reason about exposure in modern JavaScript environments,” said Socket’s Ahmad Nassri. “This is a property of how dependency resolution in ecosystems works today.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy third-party risk is the biggest gap in clients’ security posture

Related Posts

Why third-party risk is the biggest gap in clients’ security posture

April 3, 2026

New SparkCat variants of iOS, Android apps steal recovery phrase images from crypto wallets

April 3, 2026

Drift loses $285 million in North Korea-related durable Nonce social engineering attack

April 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

UNC1069 Axios Maintainer social engineering led to npm supply chain attack

Why third-party risk is the biggest gap in clients’ security posture

New SparkCat variants of iOS, Android apps steal recovery phrase images from crypto wallets

Drift loses $285 million in North Korea-related durable Nonce social engineering attack

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.