Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Exploit Axios Package in Major Attack

North Korean Hackers Exploit Axios Package in Major Attack

Posted on April 1, 2026 By CWS

A significant security breach has targeted the JavaScript ecosystem, involving the insertion of a harmful dependency into the commonly utilized axios NPM package. This attack has led to the widespread installation of the WAVESHAPER.V2 backdoor across Windows, macOS, and Linux platforms.

Impact on the JavaScript Community

The axios library, which is extensively used for managing HTTP requests, has been compromised through its versions 1.14.1 and 0.30.4. These versions surreptitiously integrated the malicious plain-crypto-js dependency, potentially affecting numerous developer environments, build servers, and applications relying on the official package stream.

Google Cloud researchers revealed that the attackers likely gained access to the axios maintainer account, altered the associated email, and introduced plain-crypto-js version 4.2.1. The attack has been attributed to UNC1069, a group linked to North Korea, based on similarities in infrastructure and malware usage.

Stealthy Delivery Mechanism

This cyber attack’s danger lies in its simplicity and effectiveness. The malicious code exploits the standard NPM installation process via a postinstall hook, enabling the dropper to operate covertly once the compromised axios package is installed.

The infection sequence involves an obfuscated JavaScript dropper known as setup.js, also referred to as SILKBELL. Upon execution, this script determines the operating system and deploys a distinct payload for each platform. For Windows, it manipulates PowerShell, while macOS and Linux see the deployment of a Mach-O binary and a Python backdoor, respectively.

Response and Mitigation Strategies

In response to this threat, organizations are advised to avoid the compromised axios versions 1.14.1 and 0.30.4, and instead use secure releases. Systems impacted by the malicious dependency should be considered compromised and require rebuilding or reverting to a secure state, alongside credential rotations.

Security teams should also suspend affected CI/CD processes, clear cache storages, and monitor for unusual activity stemming from Node.js applications. Blocking traffic to specific IPs linked to the attack is also recommended.

The incident underscores the vulnerability of trusted open source packages, which can become entry points for attackers with minimal notice. The extensive reach of axios necessitates a thorough examination of direct and indirect dependencies across all systems.

To prevent further damage, rapid containment measures are crucial, as they can significantly reduce the potential for further malicious exploitation.

Cyber Security News Tags:Axios, cyber security, JavaScript, Malware, North Korean hackers, NPM, Open Source, software supply chain, UNC1069, WAVESHAPER.V2

Post navigation

Previous Post: Microsoft’s Urgent Windows 11 Update Fixes Installation Loop
Next Post: Transforming Enterprise Security: Moving Beyond ‘Doctor No’

Related Posts

VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited Cyber Security News
Transparent Tribe Targets India’s Tech Startups Transparent Tribe Targets India’s Tech Startups Cyber Security News
Ransomware Gangs Leveraging RMM Tools to Attack Organizations and Exfiltrate Data Ransomware Gangs Leveraging RMM Tools to Attack Organizations and Exfiltrate Data Cyber Security News
Microsoft Confirms Recent Updates Cause Login Issues on Windows 11 24H2, 25H2, and Windows Server 2025 Microsoft Confirms Recent Updates Cause Login Issues on Windows 11 24H2, 25H2, and Windows Server 2025 Cyber Security News
Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens Cyber Security News
Microsoft November 2025 Patch Tuesday Microsoft November 2025 Patch Tuesday Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Depthfirst Secures $80M in Series B to Enhance AI Security
  • Google Addresses Critical Chrome Zero-Day Vulnerability
  • Russian Hackers Exploit New CTRL Toolkit for RDP Attacks
  • Hasbro Faces Cyberattack Disrupting Operations
  • Dynamic PDF Phishing Threatens Latin America and Europe

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Depthfirst Secures $80M in Series B to Enhance AI Security
  • Google Addresses Critical Chrome Zero-Day Vulnerability
  • Russian Hackers Exploit New CTRL Toolkit for RDP Attacks
  • Hasbro Faces Cyberattack Disrupting Operations
  • Dynamic PDF Phishing Threatens Latin America and Europe

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark