BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Axios NPM Attack Attributed to North Korean Hackers

North Korean hackers weaponize Axios npm with backdoor targeting cryptocurrency systems worldwide

  • The compromised Axios npm package, a core tool for millions of developers, delivered a cross-platform backdoor to Windows, macOS, and Linux systems.
  • Google Threat Intelligence Group has formally attributed the supply chain attack to the financially motivated North Korean threat actor UNC1069.
  • The malicious code used a stealthy post-install hook to deliver the WAVESHAPER.V2 backdoor, an evolution of prior malware used to target the cryptocurrency sector.
  • Users are urged to audit dependencies, check for the “plain-crypto-js” package, and isolate affected systems immediately.

In a significant escalation of software supply chain threats, the popular Axios npm package was weaponized by North Korean hackers in early April 2026. Google Threat Intelligence Group has formally attributed this attack to a group it tracks as UNC1069, which has deep experience targeting cryptocurrency.

- Advertisement -

Threat actors seized a maintainer’s account to push trojanized versions containing a malicious dependency. This rogue package leveraged a postinstall script to achieve stealthy, automatic execution upon installation.

Consequently, it delivered a dropper that fetched a next-stage backdoor tailored to the victim’s operating system. The final payload, WAVESHAPER.V2, is an updated version of a backdoor previously used by the same actor.

This backdoor supports commands to run scripts, enumerate files, and execute arbitrary binaries. It beacons to a command-and-control server every 60 seconds, establishing persistent access.

Security researchers advise mitigation by auditing dependency trees and checking for “plain-crypto-js.” Furthermore, they recommend isolating compromised systems and rotating all exposed credentials immediately.

- Advertisement -

Meanwhile, experts warn this attack serves as a template for future operations. “The level of operational sophistication… reflects a threat actor that planned this as a scalable operation,” said ReversingLabs Chief Software Architect Tomislav Peričin.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Bermuda to Move Financial Services to Stellar Network

The government of Bermuda will transition key financial services to the Stellar blockchain network...

Senate confirms Kevin Warsh to Federal Reserve board

The US Senate has confirmed Kevin Warsh as a Federal Reserve Governor, setting the...

Fake OpenAI Model on Hugging Face Spreads Malware

A fake Hugging Face repo impersonating OpenAI's Privacy Filter model reached #1 trending, using...

OpenAI Daybreak AI Hunts Software Bugs Like Anthropic’s Mythos

OpenAI launched "Daybreak," a Cybersecurity AI initiative designed to automatically detect and patch software...

City St George’s University Joins Theta EdgeCloud Network

City St George’s, University of London has partnered with Theta EdgeCloud, becoming the 34th...

Must Read

6 Best VPN Providers That Accept Monero

Privacy and anonymity are probably the most important things that we should all consider in today's internet era. Although there are a lot of...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading