North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack
Google Threat Intelligence Group (GTIG) is tracking an active software supply chain attack targeting the popular Node Package Manager (NPM) package "axios." Between March 31, 2026, 00:21 and 03:20 UTC, an attacker introduced a malicious dependency named "plain-crypto-js" into axios NPM releases versions 1.14.1 and 0.30.4. Axios is the most popular JavaScript library used to simplify HTTP requests, and these packages typically have over 100 million and 83 million weekly downloads, respectively. This malicious dependency is an obfuscated dropper that deploys the WAVESHAPER.V2 backdoor across Windows, macOS, and Linux.
AI Analysis
Technical Summary
The threat involves a sophisticated software supply chain attack targeting the Axios NPM package, a critical and widely adopted JavaScript library used to simplify HTTP requests. The attacker, identified as the North Korea-linked UNC1069 group, inserted a malicious dependency named "plain-crypto-js" into Axios releases 1.14.1 and 0.30.4 during a narrow window on March 31, 2026. This dependency is an obfuscated dropper that deploys the WAVESHAPER.V2 backdoor across major operating systems including Windows, macOS, and Linux. The backdoor provides persistent remote access, enabling attackers to execute arbitrary commands, maintain footholds, and potentially exfiltrate sensitive data. The attack chain involves abuse of command interpreters (T1059.001, T1059.004, T1059.006) and persistence techniques (T1547.001), indicating a multi-stage compromise. Given Axios’s massive adoption with over 100 million weekly downloads for the affected versions, the supply chain compromise has a broad attack surface, potentially impacting countless applications and organizations globally. The malicious code’s obfuscation complicates detection, and the lack of immediate patches or CVEs necessitates proactive defensive actions. The attack underscores the risks inherent in open-source supply chains and the need for rigorous dependency management and monitoring.
Potential Impact
The impact of this supply chain attack is substantial due to Axios’s ubiquity in web and software development worldwide. Organizations relying on the compromised Axios versions risk widespread infection by the WAVESHAPER.V2 backdoor, which can lead to unauthorized remote access, data theft, espionage, and disruption of services. The backdoor’s cross-platform capability increases the scope of affected environments, including critical infrastructure, enterprise applications, and cloud services. Confidentiality is at high risk as attackers can exfiltrate sensitive information. Integrity may be compromised through unauthorized code execution and manipulation of data or systems. Availability could be affected if attackers deploy destructive payloads or disrupt operations. The stealthy nature of the obfuscated dropper complicates detection and remediation, potentially allowing prolonged attacker presence. This attack also undermines trust in open-source software supply chains, potentially causing operational and reputational damage. The medium severity rating reflects the high impact but limited exploitation window and absence of known widespread exploitation at this time.
Mitigation Recommendations
1. Immediately audit all projects and dependencies to identify usage of Axios versions 1.14.1 and 0.30.4 and the presence of the "plain-crypto-js" dependency. 2. Revert to Axios versions prior to or after the compromised releases once verified clean versions are available. 3. Employ software composition analysis (SCA) tools to detect malicious or unexpected dependencies in the supply chain. 4. Implement runtime detection for indicators of compromise related to WAVESHAPER.V2, including unusual network connections, process behaviors, and persistence mechanisms. 5. Monitor for the provided file hashes and suspicious domains associated with the attack to identify potential infections. 6. Enforce strict code signing and integrity verification for third-party packages before deployment. 7. Isolate and contain affected systems promptly upon detection to prevent lateral movement. 8. Educate developers and DevOps teams on supply chain risks and encourage use of trusted package registries and dependency pinning. 9. Collaborate with threat intelligence providers to stay updated on emerging indicators and patches. 10. Consider implementing network segmentation and least privilege principles to limit attacker impact if compromise occurs.
Affected Countries
United States, South Korea, Japan, Germany, United Kingdom, Canada, Australia, France, India, Netherlands, Singapore
Indicators of Compromise
- hash: 04e3073b3cd5c5bfcde6f575ecf6e8c1
- hash: 089e2872016f75a5223b5e02c184dfec
- hash: 7658962ae060a222c0058cd4e979bfa1
- hash: 7a9ddef00f69477b96252ca234fcbeeb
- hash: 13ab317c5dcab9af2d1bdb22118b9f09f8a4038e
- hash: 978407431d75885228e0776913543992a9eb7cc4
- hash: a90c26e7cbb3440ac1cad75cf351cbedef7744a8
- hash: 58401c195fe0a6204b42f5f90995ece5fab74ce7c69c67a24c61a057325af668
- hash: 617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101
- hash: 92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a
- hash: e10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09
- hash: ed8560c1ac7ceb6983ba995124d5917dc1a00288912387a6389296637d5f815c
- hash: f7d335205b8d7b20208fb3ef93ee6dc817905dc3ae0c10a0b164f4e7d07121cd
- hash: fcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf
- hash: 6119a9735c3f294183164833582a0c9f38b24d70
- hash: c6f553ee31f7f9ed93bb69324fa64483173d046e
- domain: package.md
- domain: sfrclak.com
- domain: proton.me
- domain: packages.npm.org
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack
Description
Google Threat Intelligence Group (GTIG) is tracking an active software supply chain attack targeting the popular Node Package Manager (NPM) package "axios." Between March 31, 2026, 00:21 and 03:20 UTC, an attacker introduced a malicious dependency named "plain-crypto-js" into axios NPM releases versions 1.14.1 and 0.30.4. Axios is the most popular JavaScript library used to simplify HTTP requests, and these packages typically have over 100 million and 83 million weekly downloads, respectively. This malicious dependency is an obfuscated dropper that deploys the WAVESHAPER.V2 backdoor across Windows, macOS, and Linux.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The threat involves a sophisticated software supply chain attack targeting the Axios NPM package, a critical and widely adopted JavaScript library used to simplify HTTP requests. The attacker, identified as the North Korea-linked UNC1069 group, inserted a malicious dependency named "plain-crypto-js" into Axios releases 1.14.1 and 0.30.4 during a narrow window on March 31, 2026. This dependency is an obfuscated dropper that deploys the WAVESHAPER.V2 backdoor across major operating systems including Windows, macOS, and Linux. The backdoor provides persistent remote access, enabling attackers to execute arbitrary commands, maintain footholds, and potentially exfiltrate sensitive data. The attack chain involves abuse of command interpreters (T1059.001, T1059.004, T1059.006) and persistence techniques (T1547.001), indicating a multi-stage compromise. Given Axios’s massive adoption with over 100 million weekly downloads for the affected versions, the supply chain compromise has a broad attack surface, potentially impacting countless applications and organizations globally. The malicious code’s obfuscation complicates detection, and the lack of immediate patches or CVEs necessitates proactive defensive actions. The attack underscores the risks inherent in open-source supply chains and the need for rigorous dependency management and monitoring.
Potential Impact
The impact of this supply chain attack is substantial due to Axios’s ubiquity in web and software development worldwide. Organizations relying on the compromised Axios versions risk widespread infection by the WAVESHAPER.V2 backdoor, which can lead to unauthorized remote access, data theft, espionage, and disruption of services. The backdoor’s cross-platform capability increases the scope of affected environments, including critical infrastructure, enterprise applications, and cloud services. Confidentiality is at high risk as attackers can exfiltrate sensitive information. Integrity may be compromised through unauthorized code execution and manipulation of data or systems. Availability could be affected if attackers deploy destructive payloads or disrupt operations. The stealthy nature of the obfuscated dropper complicates detection and remediation, potentially allowing prolonged attacker presence. This attack also undermines trust in open-source software supply chains, potentially causing operational and reputational damage. The medium severity rating reflects the high impact but limited exploitation window and absence of known widespread exploitation at this time.
Mitigation Recommendations
1. Immediately audit all projects and dependencies to identify usage of Axios versions 1.14.1 and 0.30.4 and the presence of the "plain-crypto-js" dependency. 2. Revert to Axios versions prior to or after the compromised releases once verified clean versions are available. 3. Employ software composition analysis (SCA) tools to detect malicious or unexpected dependencies in the supply chain. 4. Implement runtime detection for indicators of compromise related to WAVESHAPER.V2, including unusual network connections, process behaviors, and persistence mechanisms. 5. Monitor for the provided file hashes and suspicious domains associated with the attack to identify potential infections. 6. Enforce strict code signing and integrity verification for third-party packages before deployment. 7. Isolate and contain affected systems promptly upon detection to prevent lateral movement. 8. Educate developers and DevOps teams on supply chain risks and encourage use of trusted package registries and dependency pinning. 9. Collaborate with threat intelligence providers to stay updated on emerging indicators and patches. 10. Consider implementing network segmentation and least privilege principles to limit attacker impact if compromise occurs.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package/"]
- Adversary
- UNC1069
- Pulse Id
- 69cd1d9aae74cc11b50ba18e
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash04e3073b3cd5c5bfcde6f575ecf6e8c1 | — | |
hash089e2872016f75a5223b5e02c184dfec | — | |
hash7658962ae060a222c0058cd4e979bfa1 | — | |
hash7a9ddef00f69477b96252ca234fcbeeb | — | |
hash13ab317c5dcab9af2d1bdb22118b9f09f8a4038e | — | |
hash978407431d75885228e0776913543992a9eb7cc4 | — | |
hasha90c26e7cbb3440ac1cad75cf351cbedef7744a8 | — | |
hash58401c195fe0a6204b42f5f90995ece5fab74ce7c69c67a24c61a057325af668 | — | |
hash617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101 | — | |
hash92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a | — | |
hashe10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09 | — | |
hashed8560c1ac7ceb6983ba995124d5917dc1a00288912387a6389296637d5f815c | — | |
hashf7d335205b8d7b20208fb3ef93ee6dc817905dc3ae0c10a0b164f4e7d07121cd | — | |
hashfcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf | — | |
hash6119a9735c3f294183164833582a0c9f38b24d70 | — | |
hashc6f553ee31f7f9ed93bb69324fa64483173d046e | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainpackage.md | — | |
domainsfrclak.com | — | |
domainproton.me | — | |
domainpackages.npm.org | — |
Threat ID: 69cd70a4e6bfc5ba1ded84d1
Added to database: 4/1/2026, 7:23:16 PM
Last enriched: 4/2/2026, 12:14:08 PM
Last updated: 4/6/2026, 9:01:48 AM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.