Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack

0
Medium
Published: Wed Apr 01 2026 (04/01/2026, 13:28:58 UTC)
Source: AlienVault OTX General

Description

Google Threat Intelligence Group (GTIG) is tracking an active software supply chain attack targeting the popular Node Package Manager (NPM) package "axios." Between March 31, 2026, 00:21 and 03:20 UTC, an attacker introduced a malicious dependency named "plain-crypto-js" into axios NPM releases versions 1.14.1 and 0.30.4. Axios is the most popular JavaScript library used to simplify HTTP requests, and these packages typically have over 100 million and 83 million weekly downloads, respectively. This malicious dependency is an obfuscated dropper that deploys the WAVESHAPER.V2 backdoor across Windows, macOS, and Linux.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 12:14:08 UTC

Technical Analysis

The threat involves a sophisticated software supply chain attack targeting the Axios NPM package, a critical and widely adopted JavaScript library used to simplify HTTP requests. The attacker, identified as the North Korea-linked UNC1069 group, inserted a malicious dependency named "plain-crypto-js" into Axios releases 1.14.1 and 0.30.4 during a narrow window on March 31, 2026. This dependency is an obfuscated dropper that deploys the WAVESHAPER.V2 backdoor across major operating systems including Windows, macOS, and Linux. The backdoor provides persistent remote access, enabling attackers to execute arbitrary commands, maintain footholds, and potentially exfiltrate sensitive data. The attack chain involves abuse of command interpreters (T1059.001, T1059.004, T1059.006) and persistence techniques (T1547.001), indicating a multi-stage compromise. Given Axios’s massive adoption with over 100 million weekly downloads for the affected versions, the supply chain compromise has a broad attack surface, potentially impacting countless applications and organizations globally. The malicious code’s obfuscation complicates detection, and the lack of immediate patches or CVEs necessitates proactive defensive actions. The attack underscores the risks inherent in open-source supply chains and the need for rigorous dependency management and monitoring.

Potential Impact

The impact of this supply chain attack is substantial due to Axios’s ubiquity in web and software development worldwide. Organizations relying on the compromised Axios versions risk widespread infection by the WAVESHAPER.V2 backdoor, which can lead to unauthorized remote access, data theft, espionage, and disruption of services. The backdoor’s cross-platform capability increases the scope of affected environments, including critical infrastructure, enterprise applications, and cloud services. Confidentiality is at high risk as attackers can exfiltrate sensitive information. Integrity may be compromised through unauthorized code execution and manipulation of data or systems. Availability could be affected if attackers deploy destructive payloads or disrupt operations. The stealthy nature of the obfuscated dropper complicates detection and remediation, potentially allowing prolonged attacker presence. This attack also undermines trust in open-source software supply chains, potentially causing operational and reputational damage. The medium severity rating reflects the high impact but limited exploitation window and absence of known widespread exploitation at this time.

Mitigation Recommendations

1. Immediately audit all projects and dependencies to identify usage of Axios versions 1.14.1 and 0.30.4 and the presence of the "plain-crypto-js" dependency. 2. Revert to Axios versions prior to or after the compromised releases once verified clean versions are available. 3. Employ software composition analysis (SCA) tools to detect malicious or unexpected dependencies in the supply chain. 4. Implement runtime detection for indicators of compromise related to WAVESHAPER.V2, including unusual network connections, process behaviors, and persistence mechanisms. 5. Monitor for the provided file hashes and suspicious domains associated with the attack to identify potential infections. 6. Enforce strict code signing and integrity verification for third-party packages before deployment. 7. Isolate and contain affected systems promptly upon detection to prevent lateral movement. 8. Educate developers and DevOps teams on supply chain risks and encourage use of trusted package registries and dependency pinning. 9. Collaborate with threat intelligence providers to stay updated on emerging indicators and patches. 10. Consider implementing network segmentation and least privilege principles to limit attacker impact if compromise occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package/"]
Adversary
UNC1069
Pulse Id
69cd1d9aae74cc11b50ba18e
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash04e3073b3cd5c5bfcde6f575ecf6e8c1
hash089e2872016f75a5223b5e02c184dfec
hash7658962ae060a222c0058cd4e979bfa1
hash7a9ddef00f69477b96252ca234fcbeeb
hash13ab317c5dcab9af2d1bdb22118b9f09f8a4038e
hash978407431d75885228e0776913543992a9eb7cc4
hasha90c26e7cbb3440ac1cad75cf351cbedef7744a8
hash58401c195fe0a6204b42f5f90995ece5fab74ce7c69c67a24c61a057325af668
hash617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101
hash92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a
hashe10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09
hashed8560c1ac7ceb6983ba995124d5917dc1a00288912387a6389296637d5f815c
hashf7d335205b8d7b20208fb3ef93ee6dc817905dc3ae0c10a0b164f4e7d07121cd
hashfcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf
hash6119a9735c3f294183164833582a0c9f38b24d70
hashc6f553ee31f7f9ed93bb69324fa64483173d046e

Domain

ValueDescriptionCopy
domainpackage.md
domainsfrclak.com
domainproton.me
domainpackages.npm.org

Threat ID: 69cd70a4e6bfc5ba1ded84d1

Added to database: 4/1/2026, 7:23:16 PM

Last enriched: 4/2/2026, 12:14:08 PM

Last updated: 4/6/2026, 9:01:48 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses