By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069
Computing

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

News Room
Last updated: 2026/04/01 at 4:26 AM
News Room Published 1 April 2026
Share
Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069
SHARE

Ravie LakshmananApr 01, 2026Threat Intelligence / Software Security

Google has formally attributed the supply chain compromise of the popular Axios npm package to a financially motivated North Korean threat activity cluster tracked as UNC1069.

“We have attributed the attack to a suspected North Korean threat actor we track as UNC1069,” John Hultquist, chief analyst at Google Threat Intelligence Group (GTIG), told The Hacker News in a statement.

“North Korean hackers have deep experience with supply chain attacks, which they’ve historically used to steal cryptocurrency. The full breadth of this incident is still unclear, but given the popularity of the compromised package, we expect it will have far reaching impacts.”

The development comes after threat actors seized control of the package maintainer’s npm account to push two trojanized versions 1.14.1 and 0.30.4 that introduced a malicious dependency named “plain-crypto-js” that’s used to deliver a cross-platform backdoor capable of infecting Windows, macOS, and Linux systems.

Rather than introducing any code changes to Axios, the attack leverages a postinstall hook within the “package.json” file of the malicious dependency to achieve stealthy execution. Once the compromised Axios package is installed, npm automatically triggers the execution of malicious code in the background.

Specifically, the “plain-crypto-js” package functions as a “payload delivery vehicle” for an obfuscated JavaScript dropper dubbed SILKBELL (“setup.js”), which fetches the appropriate next-stage from a remote server based on the victim’s operating system.

As previously detailed by The Hacker News, the Windows execution branch delivers PowerShell malware, a C++ Mach-O binary for macOS, and a Python backdoor for Linux systems. The dropper also performs a cleanup to remove itself and replace the “plain-crypto-js” package’s “package.json” file with a clean version that does not have the postinstall hook.

Image Source: Elastic Security Labs

The backdoor, codenamed WAVESHAPER.V2, is assessed to be an updated version of WAVESHAPER, a C++ backdoor deployed by UNC1069 in attacks aimed at the cryptocurrency sector. The threat actor has been operational since 2018. The supply chain attack’s links to UNC1069 were first flagged by Elastic Security Labs, citing functionality overlaps.

The three WAVESHAPER.V2 variants support four different commands, while beaconing to the command-and-control (C2) server at 60-second intervals –

  • kill, to terminate the malware’s execution process.
  • rundir, to enumerate directory listings, along with file paths, sizes, and creation/modification timestamps.
  • runscript, to run AppleScript, PowerShell, or shell commands based on the operating system.
  • peinject, to decode and execute arbitrary binaries.

“WAVESHAPER.V2 is a direct evolution of WAVESHAPER, a macOS and Linux backdoor previously attributed to UNC1069,” Mandiant and GTIG said. “While the original WAVESHAPER uses a lightweight, raw binary C2 protocol and employs code packing, WAVESHAPER.V2 communicates using JSON, collects additional system information, and supports more backdoor commands.”

“Despite these upgrades, both versions accept their C2 URL dynamically via command-line arguments, share identical C2 polling behaviors and an uncommon User-Agent string, and deploy secondary payloads to identical temporary directories (e.g., /Library/Caches/com.apple.act.mond).” 

To mitigate the threat, users are advised to audit dependency trees for compromised versions (and downgrade to a safe version, if found), pin Axios to a known safe version in the “package-lock.json” file to prevent accidental upgrades, check for presence of “plain-crypto-js” in “node_modules,” terminate malicious processes, block C2 domain (“sfrclak[.]com,” IP address: 142.11.206[.]73), isolate affected systems, and rotate all credentials.

“The Axios attack should be understood as a template, not a one-time event. The level of operational sophistication documented here, including compromised maintainer credentials, pre-staged payloads built for three operating systems, both release branches hit in under 40 minutes, and built-in forensic self-destruction, reflects a threat actor that planned this as a scalable operation,” ReversingLabs Chief Software Architect Tomislav Peričin told The Hacker News.

“If this campaign is now appearing in PyPI and NuGet, that’s consistent with what the attack mechanics already suggest: the goal was maximum developer reach. Organizations need to audit not just their npm dependencies, but every package manager feeding their build pipelines, and treat any secrets exposed in affected environments as compromised, regardless of which registry they touched.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Engineer Brings Lightning Port to iPhone 17 Pro Engineer Brings Lightning Port to iPhone 17 Pro
Next Article Today's NYT Mini Crossword Answers for April 1 – CNET Today's NYT Mini Crossword Answers for April 1 – CNET
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Best Hisense deal: Save 8.03 on the Hisense 85-inch Class U8 Mini-LED ULED 4K TV at Amazon
Best Hisense deal: Save $798.03 on the Hisense 85-inch Class U8 Mini-LED ULED 4K TV at Amazon
News
Dell XPS 13 Snapdragon Elite Laptop Sees New EC Linux Driver To Improve Support
Dell XPS 13 Snapdragon Elite Laptop Sees New EC Linux Driver To Improve Support
Computing
PSA: Legacy AT&T unlimited plans face price hikes, and it’s a mess – 9to5Mac
PSA: Legacy AT&T unlimited plans face price hikes, and it’s a mess – 9to5Mac
News
Wrapping Your Car Keys With Aluminum Foil Could Help Stop Thieves – According To Science – BGR
Wrapping Your Car Keys With Aluminum Foil Could Help Stop Thieves – According To Science – BGR
News

You Might also Like

Dell XPS 13 Snapdragon Elite Laptop Sees New EC Linux Driver To Improve Support
Computing

Dell XPS 13 Snapdragon Elite Laptop Sees New EC Linux Driver To Improve Support

2 Min Read
Tech Odyssey Series: How Omniflow is rethinking streetlights with EV charging, connectivity, and clean energy · TechNode
Computing

Tech Odyssey Series: How Omniflow is rethinking streetlights with EV charging, connectivity, and clean energy · TechNode

7 Min Read
CBN gives banks 21 days to grade their cyber defences |
Computing

CBN gives banks 21 days to grade their cyber defences |

3 Min Read
How to Navigate Creator Burnout in 2023 (+ Free Report)
Computing

How to Navigate Creator Burnout in 2023 (+ Free Report)

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?