Asia

North Korea-linked hackers hijack Axios npm package

Malicious releases spread via developer supply chain, three-hour window exposes how trust is outsourced to unpriced dependencies

Images

Lorenzo Franceschi-Bicchierai Lorenzo Franceschi-Bicchierai techcrunch.com

A North Korean-linked hacker briefly hijacked Axios, one of the most widely used JavaScript libraries on the npm repository, pushing malicious versions that could install a remote-access trojan on developers’ machines. TechCrunch reports the compromised releases were live for roughly three hours before being removed, after the attacker took over a maintainer account and shipped what looked like routine updates for Windows, macOS and Linux.

The incident is a reminder that modern software is assembled, not written: a typical application pulls in hundreds or thousands of third‑party packages, many maintained by a handful of volunteers, and delivered through automated build pipelines that few companies audit end-to-end. In this setup, the attacker does not need to breach each target; they only need to become “trusted” once, inside a dependency that sits upstream of millions of downstream builds. StepSecurity said it detected the malicious publish quickly, but the window matters less than the principle: a single compromised maintainer credential can turn a global developer ecosystem into a distribution channel.

The economics push in the wrong direction. Enterprises spend heavily on compliance frameworks and vendor questionnaires, but open-source dependencies often arrive through transitive imports that never pass procurement. The cost of careful dependency hygiene—pinning versions, verifying signatures, maintaining internal mirrors, running reproducible builds, funding maintainers—lands on the user. The upside of shipping faster lands on the product team. Meanwhile, an attacker can amortize the effort of one account takeover across tens of millions of weekly downloads.

TechCrunch notes the malicious code was designed to delete itself after installation, an attempt to evade antivirus engines and forensic review. That kind of operational discipline is easier when the attacker controls the delivery mechanism: you can ship stealth features once, then let the ecosystem do the rollout. Google’s Threat Intelligence Group attributed the compromise to a suspected North Korean actor it tracks as UNC1069, a group it says has experience using supply-chain attacks for cryptocurrency theft.

Even when an incident is caught quickly, the cleanup is slow and expensive: teams must identify whether they pulled the tainted versions, rotate secrets, rebuild artifacts, and assume compromise in environments that treat package installs as routine. The compliance report arrives after the dependency graph has already shipped.

Axios is downloaded tens of millions of times each week, and for several hours on Monday night, the “trusted” version was the attacker’s.