Categories: Cyber Security News

North Korean Hackers Compromise Popular Axios Package to Infect Windows, macOS, and Linux

A major software supply chain attack has struck the JavaScript ecosystem after threat actors slipped a malicious dependency into the widely used axios NPM package.

The poisoned releases, axios 1.14.1 and 0.30.4, pulled in plain-crypto-js and quietly delivered the WAVESHAPER.V2 backdoor to Windows, macOS, and Linux systems during installation.

The incident is serious because Axios is one of the most common libraries for handling HTTP requests, and the affected branches normally draw very large weekly download volumes.

That reach means one compromised package update could expose developer laptops, build servers, CI/CD pipelines, and downstream applications that trusted the official package stream.

After reviewing the intrusion, Google Cloud researchers detected the attacker likely compromised the axios maintainer account, changed the email tied to it, and then inserted plain-crypto-js version 4.2.1 into the package.

The company linked the activity to UNC1069, a financially motivated North Korea-nexus threat actor, based on overlaps in infrastructure and the use of the updated WAVESHAPER.V2 malware family.

What makes this campaign especially dangerous is its simple delivery method. Instead of waiting for a user to open a file or click a link, the malicious code abused the normal NPM install process through a postinstall hook, allowing the dropper to run in the background as soon as the tainted axios package was installed.

How the infection worked

The infection chain centered on an obfuscated JavaScript dropper called setup.js, which GTIG also tracks as SILKBELL. Once executed, the script checked the operating system and delivered a different payload for each platform.

On Windows, it searched for powershell.exe, copied it to another path to reduce suspicion, downloaded a PowerShell stage with curl, and ran it with hidden and execution-policy-bypass options.

On macOS, it used bash and curl to place a Mach-O binary in /Library/Caches/com.apple.act.mond, changed file permissions, and launched it through zsh. On Linux, it downloaded a Python backdoor to /tmp/ld.py.

The malware also tried to hide what it had done. Google’s analysis showed that setup.js attempted to delete itself after dropping the next stage and restore the altered package.json from a stored copy so forensic review would be harder.

The final payload, WAVESHAPER.V2, then beaconed to its command-and-control server every 60 seconds over port 8000 using Base64-encoded JSON and a hard-coded user-agent string.

This backdoor gives the attackers far more than simple remote access. GTIG said the malware can collect system details, list files and directories, run scripts, inject or execute additional payloads, and wait for more commands from the server.

On Windows, the threat can also persist by creating a hidden batch file and adding a MicrosoftUpdate entry under the current user’s Run registry key so it launches at logon.

For defenders, the response should begin with package control and host containment. Google said organizations should avoid axios versions 1.14.1 and 0.30.4, pin projects to known-good releases such as 1.14.0 or earlier and 0.30.3 or earlier, and check lockfiles for plain-crypto-js versions 4.2.0 or 4.2.1.

Any system that installed the malicious dependency should be treated as compromised, rebuilt or reverted to a known-good state, and followed by credential rotation for tokens, API keys, and other secrets that may have been present on the host.

Teams should also pause affected CI/CD jobs, clear npm, yarn, and pnpm caches, block traffic to sfrclak[.]com and 142.11.206.73, and watch for suspicious child processes spawned from Node.js applications.

The wider lesson is clear: trusted open source packages can become intrusion points with very little warning. In this case, the attackers used routine developer behavior, package installation, to move from a software update into full cross-platform compromise.

Since axios sits deep inside many dependency trees, organizations now need to review not only direct installations but also inherited exposure across build pipelines, internal tools, and production services.

Where plain-crypto-js is found, defenders should assume the malware may have reached beyond the first machine and validate nearby systems for related activity. Speed matters most, ad the early containment can limit follow-on abuse.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post North Korean Hackers Compromise Popular Axios Package to Infect Windows, macOS, and Linux appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Pennsylvania Lawmakers Are Talking the Talk on Data Center Regulations. But Will They Walk the Talk?

This article originally appeared on Inside Climate News, a nonprofit, non-partisan news organization that covers…

3 minutes ago

Indiana F-16 Wing Hosts Slovak Air Force for Joint Combat Exercise

TUCSON, AZ (WOWO) Indiana Air National Guard pilots and the Slovak Air Force conducted a…

8 minutes ago

Fort Wayne Pastor Delivers Prayer in U.S. House

WASHINGTON, D.C. (WOWO) — A Fort Wayne-area pastor was invited to deliver the opening prayer…

8 minutes ago

Indiana State Police Investigate Fatal Muncie Officer-Involved Shooting

MUNCIE, Ind. (WOWO) — Indiana State Police are investigating a fatal officer-involved shooting that occurred…

8 minutes ago

Public Hearing Set on Google Temporary Office Plan

FORT WAYNE, Ind. (WOWO)— Google is seeking approval to use farmland it purchased along Tillman…

8 minutes ago

Resident Evil Movie Director Zach Cregger Expects Fans Will ‘Crucify’ Him if His Reboot Deviates From Franchise Lore

Zach Cregger, director of the upcoming Resident Evil movie reboot, has said he expects fans…

18 minutes ago

This website uses cookies.