ATLA WIRE

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

02.04.2026
8074
Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069
Google has linked the recent Axios npm supply chain attack to the North Korean threat actor UNC1069. The attack involved trojanized versions 1.14.1 and 0.30.4 that spread the WAVESHAPER.V2 malware, impacting multiple operating systems.

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Google has linked the recent Axios npm supply chain attack to the North Korean threat actor UNC1069. The attack involved trojanized versions 1.14.1 and 0.30.4 that spread the WAVESHAPER.V2 malware, impacting multiple operating systems.
Article image 1
The attack was a classic supply chain compromise: malicious actors uploaded trojanized versions of the popular Axios npm package, which then spread malware to unsuspecting developers. This isn't just a minor bug—it's a full-blown infiltration of the software ecosystem.
UNC1069, a North Korean state-sponsored group, is behind this operation. They're known for targeting cryptocurrency and financial sectors, and this attack fits their MO perfectly. The malware, WAVESHAPER.V2, is designed to steal sensitive data and establish persistent access.
  • Trojanized versions: 1.14.1 and 0.30.4
  • Malware: WAVESHAPER.V2
  • Threat actor: UNC1069 (North Korea)
  • Impact: Multiple operating systems
  • Attack type: Supply chain compromise
Google's Threat Analysis Group (TAG) identified the attack and attributed it to UNC1069. This group has been active for years, targeting developers and companies in the crypto space. Their goal? Financial gain and espionage.
The attack highlights the vulnerabilities in open-source software ecosystems. npm, with its massive dependency tree, is a prime target for state-sponsored actors. One compromised package can ripple through thousands of projects.

Supply chain attacks are becoming the new normal. State actors like UNC1069 are exploiting trust in open-source repositories to deploy malware at scale.

Developers are urged to verify package integrity, use lockfiles, and monitor for unusual behavior. Tools like npm audit and dependency scanning can help, but vigilance is key. This isn't the first npm attack, and it won't be the last.
The broader implications? Open-source maintainers need more support, and the industry must prioritize security over convenience. Until then, attacks like this will keep happening.
#npm packages#supply chain attacks#malware#state-sponsored cyber attacks#Open Source
Got a topic? Write to ATLA WIRE on Telegram:t.me/atla_community
Banner | ATLA WIRE
ATLA WIRE