Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Exploit Axios Package in Major Attack

North Korean Hackers Exploit Axios Package in Major Attack

Posted on April 1, 2026 By CWS

A significant security breach has targeted the JavaScript ecosystem, involving the insertion of a harmful dependency into the commonly utilized axios NPM package. This attack has led to the widespread installation of the WAVESHAPER.V2 backdoor across Windows, macOS, and Linux platforms.

Impact on the JavaScript Community

The axios library, which is extensively used for managing HTTP requests, has been compromised through its versions 1.14.1 and 0.30.4. These versions surreptitiously integrated the malicious plain-crypto-js dependency, potentially affecting numerous developer environments, build servers, and applications relying on the official package stream.

Google Cloud researchers revealed that the attackers likely gained access to the axios maintainer account, altered the associated email, and introduced plain-crypto-js version 4.2.1. The attack has been attributed to UNC1069, a group linked to North Korea, based on similarities in infrastructure and malware usage.

Stealthy Delivery Mechanism

This cyber attack’s danger lies in its simplicity and effectiveness. The malicious code exploits the standard NPM installation process via a postinstall hook, enabling the dropper to operate covertly once the compromised axios package is installed.

The infection sequence involves an obfuscated JavaScript dropper known as setup.js, also referred to as SILKBELL. Upon execution, this script determines the operating system and deploys a distinct payload for each platform. For Windows, it manipulates PowerShell, while macOS and Linux see the deployment of a Mach-O binary and a Python backdoor, respectively.

Response and Mitigation Strategies

In response to this threat, organizations are advised to avoid the compromised axios versions 1.14.1 and 0.30.4, and instead use secure releases. Systems impacted by the malicious dependency should be considered compromised and require rebuilding or reverting to a secure state, alongside credential rotations.

Security teams should also suspend affected CI/CD processes, clear cache storages, and monitor for unusual activity stemming from Node.js applications. Blocking traffic to specific IPs linked to the attack is also recommended.

The incident underscores the vulnerability of trusted open source packages, which can become entry points for attackers with minimal notice. The extensive reach of axios necessitates a thorough examination of direct and indirect dependencies across all systems.

To prevent further damage, rapid containment measures are crucial, as they can significantly reduce the potential for further malicious exploitation.

Cyber Security News Tags:Axios, cyber security, JavaScript, Malware, North Korean hackers, NPM, Open Source, software supply chain, UNC1069, WAVESHAPER.V2

Post navigation

Previous Post: Microsoft’s Urgent Windows 11 Update Fixes Installation Loop
Next Post: Transforming Enterprise Security: Moving Beyond ‘Doctor No’

Related Posts

ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix Cyber Security News
Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender Cyber Security News
ClickFix Attacks Evolved With Weaponized Videos That Tricks Users via Self-infection Process ClickFix Attacks Evolved With Weaponized Videos That Tricks Users via Self-infection Process Cyber Security News
IBM QRadar Vulnerabilities Let Attackers Access Sensitive Configuration Files IBM QRadar Vulnerabilities Let Attackers Access Sensitive Configuration Files Cyber Security News
Sensata Technologies Hit by Ransomware Attack Sensata Technologies Hit by Ransomware Attack Cyber Security News
AI-Powered Cyber Threats Demand New Defense Strategies AI-Powered Cyber Threats Demand New Defense Strategies Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chrome Update Fixes Zero-Day Among 21 Vulnerabilities
  • Microsoft Alerts on WhatsApp Malware Using UAC Bypass
  • Critical Flaw in Google Cloud Vertex AI Exposes Data
  • U.S. Accuses Hacker in Uranium Exchange Breach
  • Transforming Enterprise Security: Moving Beyond ‘Doctor No’

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chrome Update Fixes Zero-Day Among 21 Vulnerabilities
  • Microsoft Alerts on WhatsApp Malware Using UAC Bypass
  • Critical Flaw in Google Cloud Vertex AI Exposes Data
  • U.S. Accuses Hacker in Uranium Exchange Breach
  • Transforming Enterprise Security: Moving Beyond ‘Doctor No’

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark