UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
嗯,用户让我总结这篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要快速浏览文章内容,抓住主要信息。 文章讲的是Axios npm包的维护者Jason Saayman遭遇了供应链攻击。攻击者是朝鲜的威胁组织UNC1069,他们使用了高度针对性的社会工程学手段。攻击过程包括伪造合法公司的身份,创建看起来真实的Slack工作区和Microsoft Teams会议,最终部署了远程访问木马,窃取了npm账户凭证,发布了两个被感染的Axios版本。 攻击的影响很大,因为Axios每周下载量近1亿次,在JavaScript生态系统中使用广泛。这说明开源项目维护者正成为复杂攻击的目标,可能导致大规模传播。 总结时要涵盖关键点:攻击者身份、手段、影响和后果。控制在100字以内,所以需要简洁明了。 可能会这样组织:朝鲜黑客通过社会工程学攻击Axios维护者,部署木马窃取凭证,发布恶意包。由于Axios广泛使用,导致大规模影响。 检查字数是否符合要求,并确保没有遗漏重要信息。 </think> 朝鲜黑客 UNC1069 通过高度针对性的社会工程学攻击 Axios npm 包维护者 Jason Saayman。攻击者伪装成合法公司创始人,创建逼真的 Slack 工作区,并诱骗 Saayman 在虚假 Microsoft Teams 会议中触发远程访问木马。该木马使黑客窃取 npm 账户凭证并发布两个恶意版本的 Axios 包(1.14.1 和 0.30.4),植入 WAVESHAPER.V2 后门。由于 Axios 每周下载量近 1 亿次且广泛应用于 JavaScript 生态系统,此次供应链攻击可能造成大规模影响。 2026-4-3 11:4:0 Author: thehackernews.com(查看原文) 阅读量:6 收藏

Threat Intelligence / Malware

The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly-targeted social engineering campaign orchestrated by North Korean threat actors tracked as UNC1069.

Maintainer Jason Saayman said the attackers tailored their social engineering efforts "specifically to me" by first approaching him under the guise of the founder of a legitimate, well-known company.

"They had cloned the company's founders' likeness as well as the company itself," Saayman said in a post-mortem of the incident. "They then invited me to a real Slack workspace. This workspace was branded to the company's CI and named in a plausible manner. The Slack [workspace] was thought out very well; they had channels where they were sharing LinkedIn posts."

Subsequently, the threat actors are said to have scheduled a meeting with him on Microsoft Teams. Upon joining the fake call, he was presented with a fake error message that stated "something on my system was out of date." As soon as the update was triggered, the attack led to the deployment of a remote access trojan.

The access afforded by the Trojan enabled the attackers to steal the npm account credentials necessary to publish two trojanized versions of the Axios npm package (1.14.1 and 0.30.4) containing an implant named WAVESHAPER.V2.

"Everything was extremely well coordinated, looked legit, and was done in a professional manner," Saayman added.

The attack chain described by the project maintainer shares extensive overlaps with tradecraft associated with UNC1069 and BlueNoroff. Details of the campaign were extensively documented by Huntress and Kaspersky last year, with the latter tracking it under the moniker GhostCall.

"Historically, [...] these specific guys have gone after crypto founders, VCs, public people," security researcher Taylor Monahan said. "They social engineer them and take over their accounts and target the next round of people. This evolution to targeting [OSS maintainers] is a bit concerning in my opinion."

As preventive steps, Saayman has outlined several changes, including resetting all devices and credentials, setting up immutable releases, adopting OIDC flow for publishing, and updating GitHub Actions to adopt best practices.

The findings demonstrate how open-source project maintainers are increasingly becoming the target of sophisticated attacks, effectively allowing threat actors to target downstream users at scale by publishing poisoned versions of highly popular packages.

With Axios attracting nearly 100 million weekly downloads and being used heavily across the JavaScript ecosystem, the blast radius of such a supply chain attack can be massive as it propagates swiftly through direct and transitive dependencies.

"A package as widely used as Axios being compromised shows how difficult it is to reason about exposure in a modern JavaScript environment," Socket's Ahmad Nassri said. "It is a property of how dependency resolution in the ecosystem works today."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/unc1069-social-engineering-of-axios.html
如有侵权请联系:admin#unsafe.sh