Suspected North Korean Hackers Compromise Axios Package in Supply-Chain Attack
Security experts said the breach could take months to assess, with about 135 devices at roughly 12 companies already identified.
- Suspected North Korean hackers compromised the software package Axios on Tuesday, gaining control of a developer's account for three hours and pushing malicious updates to thousands of companies.
- Pyongyang relies on digital heists to fund nuclear and missile programs, a tactic the regime employed three years ago when infiltrating another popular software provider used by healthcare and hotel firms.
- John Hammond, security researcher at Huntress, identified about 135 compromised devices belonging to roughly 12 companies, describing the hack as "perfectly timed" given AI agents developing software without review.
- "We anticipate they will try to leverage the credentials," Charles Carmakal, Mandiant chief technology officer, warned, as experts expect recovery will take months while attackers target cryptocurrency assets.
- High-Profile, noisy operations are a price Pyongyang is willing to pay because the regime is not worried about its international reputation, Ben Read, director of strategic threat intelligence at Google-owned Wiz, noted.
17 Articles
17 Articles
North Korean hackers bug software used by thousands of US companies in potential crypto heist attempt
Suspected North Korean hackers have bugged a software package that has been used by thousands of US companies in a major supply-chain attack that could take months to recover from, security experts said Tuesday.
North Korea-linked hack hits largely invisible software that powers online services
Hackers linked to North Korea breached behind-the-scenes software that runs many common online functions in an effort to steal login information that could enable further cyber operations, Google said on Tuesday.
Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069
Google has formally attributed the supply chain compromise of the popular Axios npm package to a financially motivated North Korean threat activity cluster tracked as UNC1069. "We have attributed the attack to a suspected North Korean threat actor we track as UNC1069," John Hultquist, chief analyst at Google Threat Intelligence Group (GTIG), told The Hacker News in a statement. "North Korean
Coverage Details
Bias Distribution
- 72% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium












