...
Cyber security NewsNews

Axios Library Hit by North Korean Hackers, Raising Crypto Theft Concerns

Pyongyang-linked UNC1069 hijacks critical open-source infrastructure to target cryptocurrency enterprises.

Key Takeaways

  • Lazarus-linked group UNC1069 compromised the Axios npm account for three hours on Tuesday.
  • Malicious updates 1.14.1 and 0.30.4 deliver cross-platform “WAVESHAPER.V2” remote access trojan.
  • Experts warn of long-term cryptocurrency theft to fund North Korean missile programs.
  • Supply chain attack bypasses traditional defenses by exploiting trusted developer account credentials.

A sophisticated cyber-espionage attack linked to North Korean threat actor UNC1069 shocked the global software community after successfully compromising Axios, a widely used JavaScript library.

For three critical hours on Tuesday morning, hackers took over a primary developer’s npm account, pushing infected updates to a package downloaded tens of millions of times weekly.

This precise strike targets the hidden systems of the internet, allowing Pyongyang to steal billions in cryptocurrency from healthcare, finance, and tech firms while avoiding detection with self-deleting malware.

North Korean Hackers Hijack Axios Infrastructure

The breach began when suspected North Korean operatives gained unauthorized access to the npm account of a senior Axios maintainer, identified as Jason Saayman

Reports from TechCrunch say the attackers locked the developer out by changing his registered email to their own. During this takeover, they published malicious versions 1.14.1 and 0.30.4. 

These updates added a hidden dependency called “plain-crypto-js” to deliver the SILKBELL dropper, a tool that secretly installs harmful software on infected systems. 

The attack lasted about three hours before being stopped, but the potential impact is serious. Because Axios is widely used across the digital economy to handle web requests, the malicious code reached an unknown number of automated build systems and developer setups worldwide.

Why the UNC1069 Breach Matters Internally

The significance of this attack lies in its “invisible” nature and the extreme trust placed in open-source dependencies. 

As Tom Hegel, a senior researcher at SentinelOne, explained to Reuters, Axios runs in the background of almost every modern digital interaction, from checking bank balances to loading mobile applications. 

By targeting this key system, UNC1069 gained access to millions of environments without requiring any user to click a suspicious link. 

Mandiant, a Google-owned cyber intelligence firm, has linked this activity to North Korea’s broader strategy of funding its nuclear and missile programs through digital theft. 

Ben Read, a cybersecurity researcher at Wiz, told CNN that, unlike typical hackers who try to stay hidden, Pyongyang focuses on stealing large amounts of cryptocurrency data rather than avoiding attention.

Experts and Mandiant Detail Attack Mechanics

The technical sophistication of the payload shows a highly organized attacker. 

According to The Hacker News, the malware, called WAVESHAPER.V2, is an updated version of earlier North Korean tools, now built to support JSON-based communication and infect across Windows, macOS, and Linux systems. 

Charles Carmakal, CTO at Mandiant, warned that the group plans to use the stolen data for a long-term campaign that could take months to fix, per CNN.

John Hammond, security researcher at Huntress, found that the malware was built to automatically delete its own files to avoid detection. He described the hack to CNN as “perfectly timed,” noting that the rise of AI agents, which often pull and use code without human checks, has created an “open door” for these supply chain attacks.

Broader Impact on Global Software Supply

This incident highlights a systemic vulnerability in the global software supply chain beyond the immediate damage to Axios. 

According to Reuters, Elastic Security Labs analyzed the delivery mechanism, noting that the attackers prepared payloads for three different operating systems, showing a scalable operation rather than a one-time attack.

Beyond the immediate risk of cryptocurrency theft, the compromise of a package with reported 80 million weekly downloads means the wider impact will spread across the industry for the rest of 2026. 

Every organization using these dependencies must now treat any sensitive data or credentials exposed during the breach window as compromised and review their approach to safeguarding sensitive data.

Future Outlook for AI-Driven Cybersecurity

Looking ahead, the integration of artificial intelligence into hacking workflows signals a new phase of persistent threats. Analysts note that detection times are increasing as attackers use AI to continuously modify malicious code and avoid detection.

This Axios breach shows that North Korean groups are already operating at this intersection of automation and infrastructure control.

Organizations are now being urged to move beyond simple updates and adopt a “zero trust” software bill of materials (SBOM) approach to reduce future risk.

Source: Hackers Compromise Axios, Widely Used Software

Fawad Malik

Fawad Malik is a digital marketing professional with over 15 years of industry experience, specializing in SEO, SaaS, AI, content strategy, and online branding. He is the Founder and CEO of WebTech Solutions, a leading digital marketing agency committed to helping businesses grow through innovative digital strategies. Fawad shares insights on the latest trends, tools, guides and best practices in digital marketing to help marketers and online entrepreneurs worldwide. He tends to share the latest tech news, trends, and updates with the community built around NogenTech.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button