HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔓 Breach

North Korean Threat Actors Hijack Axios Maintainer, Deploy RAT via Malicious npm Packages

A targeted social‑engineering campaign compromised the lead maintainer of the popular Axios HTTP client, allowing North Korean UNC1069 actors to publish malicious npm versions that installed a remote‑access trojan on multiple operating systems. The brief availability of the packages exposed any downstream projects that installed them, underscoring critical third‑party risk in open‑source supply chains.

🛡️ LiveThreat™ Intelligence · 📅 April 05, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
🔓
Type
Breach
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
4 recommended
📰
Source
bleepingcomputer.com

North Korean Threat Actors Hijack Axios Maintainer, Deploy RAT via Malicious npm Packages

What Happened – A social‑engineering campaign impersonating a legitimate company convinced Axios lead maintainer Jason Saayman to install a fake Microsoft Teams update. The attacker used the compromised credentials to publish two malicious Axios versions (1.14.1 and 0.30.4) to the npm registry, each bundling a “plain‑crypto‑js” dependency that installed a remote‑access trojan on macOS, Windows, and Linux systems. The packages were live for roughly three hours before removal.

Why It Matters for TPRM

  • Open‑source supply‑chain attacks can compromise any downstream organization that blindly trusts third‑party libraries.
  • Credential compromise of a maintainer demonstrates the need for strong identity hygiene (MFA, credential rotation) for all third‑party contributors.
  • The incident is linked to the North Korean UNC1069 group, highlighting nation‑state interest in open‑source ecosystems.

Who Is Affected – Software development teams across all sectors (technology, finance, healthcare, retail, etc.) that consumed the malicious Axios releases during the exposure window.

Recommended Actions

  • Immediately audit your dependency list for any Axios versions published between the attack window; replace if found.
  • Enforce multi‑factor authentication and credential rotation for all third‑party maintainer accounts.
  • Deploy software‑bill of materials (SBOM) and continuous monitoring of upstream package registries.
  • Review and harden your open‑source governance policies (code signing, provenance checks).

Technical Notes – Attack vector: targeted social engineering (phishing) → compromised maintainer credentials → malicious npm publish. No CVE was involved; the malicious payload was delivered via a trojanized plain-crypto-js dependency. Data types compromised include system credentials, authentication tokens, and potentially sensitive project code. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/axios-npm-hack-used-fake-teams-error-fix-to-hijack-maintainer-account/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.