Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

537+ Articles
116+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
NEWS

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

The North Korean threat actor UNC1069 used a sophisticated, targeted social engineering campaign against the Axios npm package maintainer Jason Saayman to compromise one of the most widely-used JavaScript HTTP libraries, affecting millions of downstream projects.

Dylan H.

News Desk

April 4, 2026
4 min read

The maintainer of the widely-used Axios npm package has confirmed that the recent supply chain compromise was the result of a highly targeted social engineering campaign orchestrated by UNC1069, a North Korean threat actor tracked by Google's Threat Intelligence Group (GTIG). The attack is the latest in a series of sophisticated software supply chain intrusions attributed to DPRK-linked groups.

The Axios Package: Scale of Exposure

Axios is one of the most widely downloaded JavaScript libraries in existence, with hundreds of millions of weekly downloads via npm. Used across frontend and backend JavaScript applications for HTTP requests, the package is a dependency in countless enterprise applications, open-source projects, and web services worldwide. Compromising Axios with a malicious payload provides near-unprecedented supply chain reach.

How UNC1069 Pulled It Off

Maintainer Jason Saayman confirmed that UNC1069 conducted a tailored social engineering campaign against him specifically. According to his account, the attackers:

  • Researched Saayman extensively before contact, understanding his professional background, interests, and community presence
  • Established a credible persona — posing as a potential collaborator, employer, or contributor with legitimate-appearing credentials and history
  • Built rapport over time through email and messaging channels before making any malicious ask
  • Exploited the trust established to persuade Saayman to take actions that ultimately granted the attackers publishing access to the Axios npm package

The specifics of the credential exfiltration or access handover have not been fully disclosed, but the attack resulted in UNC1069 publishing backdoored versions of Axios to the npm registry.

North Korea's Supply Chain Playbook

UNC1069 is part of a broader cluster of North Korean cyber operations that have increasingly focused on software supply chain attacks as a means of achieving scale. Previous operations attributed to DPRK-linked groups include:

  • Operation Dream Job — fake employment offers targeting developers and security researchers
  • Lazarus Group npm attacks — malicious packages on npm and PyPI mimicking legitimate developer tools
  • 3CX supply chain attack (2023) — a cascading supply chain compromise affecting the VoIP software company

The social engineering approach used against Saayman follows the "Dream Job" pattern, where attackers invest significant effort in building authentic-seeming personas to target individuals with privileged access to critical infrastructure.

The Backdoored Package

Compromised versions of Axios contained malicious code designed to exfiltrate sensitive data from environments where the package was executed. Affected functionality included:

  • Credential and token harvesting from environment variables commonly set in cloud and CI/CD environments
  • Covert data exfiltration to attacker-controlled infrastructure
  • Persistence mechanisms designed to maintain access even after the malicious npm versions were removed from the registry

npm and affected organizations moved quickly to:

  1. Remove the malicious versions from the registry
  2. Publish clean replacement versions with updated checksums
  3. Notify downstream users via GitHub Security Advisories

Impact Assessment

Given Axios's download volume, the potential scope of exposure is significant. Organizations most at risk include those that:

  • Use automated dependency updates (Dependabot, Renovate) without pinning specific versions
  • Run CI/CD pipelines with access to production credentials, cloud tokens, or secrets managers
  • Install packages at runtime in containerized environments with elevated privileges

Security teams should audit their environments for any execution of the compromised Axios versions and treat any potentially affected secrets as compromised.

Defense Recommendations

This attack reinforces several supply chain security best practices:

  1. Pin dependency versions using exact version locks rather than semver ranges in production
  2. Enable npm package signature verification where available
  3. Monitor for unexpected network connections from build and CI/CD environments
  4. Rotate all secrets and tokens if a compromised package version was installed in environments with access to credentials
  5. Implement least-privilege principles for CI/CD — build pipelines should not have access to production secrets unless strictly necessary
  6. Use software composition analysis (SCA) tools that can alert on newly identified malicious packages quickly

The Human Element of Supply Chain Risk

What makes this attack particularly significant is the emphasis on human manipulation rather than technical exploitation. The Axios npm registry credentials themselves were not cracked — they were handed over as a result of sustained, targeted social engineering.

This shifts part of the supply chain security burden to maintainer awareness training and community-level defenses. Initiatives like the OpenSSF and GitHub's maintainer security resources are working to address this gap, but individual maintainers of high-impact packages remain high-value targets.

For the broader open-source ecosystem, this incident raises difficult questions about the security posture of volunteer maintainers who manage infrastructure depended upon by billions of applications worldwide.


Source: The Hacker News

#Supply Chain#North Korea#npm#Social Engineering#Threat Intelligence#The Hacker News

Related Articles

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Google's Threat Intelligence Group has formally attributed the supply chain compromise of the popular Axios npm package to UNC1069, a financially motivated North Korean threat activity cluster with a history of targeting developer tooling, cryptocurrency platforms, and software supply chains.

6 min read

Axios NPM Package Breached in North Korean Supply Chain Attack

A long-lived NPM access token was used to bypass the GitHub Actions OIDC-based CI/CD publishing workflow and push backdoored versions of the widely used Axios HTTP library, in an attack now attributed to North Korean threat actor UNC1069.

6 min read

Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms

Anthropic confirmed that internal source code for its Claude Code AI coding assistant was accidentally published to npm due to a human packaging error. No sensitive customer data or credentials were exposed in the incident.

5 min read
Back to all News