BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Axios NPM Attack Attributed to North Korean Hackers

North Korean hackers weaponize Axios npm with backdoor targeting cryptocurrency systems worldwide

  • The compromised Axios npm package, a core tool for millions of developers, delivered a cross-platform backdoor to Windows, macOS, and Linux systems.
  • Google Threat Intelligence Group has formally attributed the supply chain attack to the financially motivated North Korean threat actor UNC1069.
  • The malicious code used a stealthy post-install hook to deliver the WAVESHAPER.V2 backdoor, an evolution of prior malware used to target the cryptocurrency sector.
  • Users are urged to audit dependencies, check for the “plain-crypto-js” package, and isolate affected systems immediately.

In a significant escalation of software supply chain threats, the popular Axios npm package was weaponized by North Korean hackers in early April 2026. Google Threat Intelligence Group has formally attributed this attack to a group it tracks as UNC1069, which has deep experience targeting cryptocurrency.

- Advertisement -

Threat actors seized a maintainer’s account to push trojanized versions containing a malicious dependency. This rogue package leveraged a postinstall script to achieve stealthy, automatic execution upon installation.

Consequently, it delivered a dropper that fetched a next-stage backdoor tailored to the victim’s operating system. The final payload, WAVESHAPER.V2, is an updated version of a backdoor previously used by the same actor.

This backdoor supports commands to run scripts, enumerate files, and execute arbitrary binaries. It beacons to a command-and-control server every 60 seconds, establishing persistent access.

Security researchers advise mitigation by auditing dependency trees and checking for “plain-crypto-js.” Furthermore, they recommend isolating compromised systems and rotating all exposed credentials immediately.

- Advertisement -

Meanwhile, experts warn this attack serves as a template for future operations. “The level of operational sophistication… reflects a threat actor that planned this as a scalable operation,” said ReversingLabs Chief Software Architect Tomislav Peričin.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Kelp DAO Attacker Starts Laundering Stolen $175M in Ether

The attacker behind the $290 million Kelp DAO exploit has begun moving stolen funds,...

CISA Adds Eight Exploited Vulnerabilities to KEV Catalog

The U.S. cybersecurity agency has flagged eight new software flaws being actively exploited by...

Arbitrum Freezes $71 Million from Kelp DAO Hack

The Arbitrum Security Council froze $71 million in stolen funds from the Kelp DAO...

HKMA Grants First Two Stablecoin Licenses to HSBC, StanChart

The Hong Kong Monetary Authority granted the first two stablecoin licenses to HSBC and...

Tesla Q1 Earnings Due After Second Delivery Miss

Longtime shareholder Ross Gerber criticizes Tesla's focus on AI and robotics as a distraction...

Must Read

Top 7 BEST Crypto Trading Bots for Beginners

QUICK NAVIGATIONQuick Look: Top 3 Best Crypto Trading BotsWhat Exactly is a Crypto Trading Bot?How I Chose These Trading BotsTop 7 Crypto Trading Bots...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading