← Back to feed

Axios npm Supply Chain Attack: North Korean UNC1069 Deploys Cross-Platform WAVESHAPER.V2 RAT

Date: 2026-04-01
TLP: TLP:CLEAR
Tags: supply-chain, npm, malware, nation-state, attribution

Executive Summary

Google Threat Intelligence Group attributes the Axios npm package compromise to UNC1069, a North Korea-nexus financially motivated threat actor, based on infrastructure overlaps and use of WAVESHAPER.V2 backdoor. The malicious versions were live for approximately 2-3 hours on March 31, 2026, with both latest and legacy tags compromised to maximize blast radius. Organizations must immediately audit for affected versions and treat any system with exposure as fully compromised.

Campaign Summary

FieldDetail
Campaign / MalwareAxios npm Supply Chain Attack
AttributionUNC1069 (North Korea-nexus) (confidence: high)
TargetJavaScript developers and CI/CD infrastructure globally
VectorCompromised npm maintainer account
Statusdisrupted
First ObservedMarch 31, 2026

Detailed Findings

On March 31, 2026, attackers compromised the npm account of the lead Axios maintainer and published two malicious versions (1.14.1 and 0.30.4) that introduced a hidden dependency delivering a cross-platform Remote Access Trojan. The malicious versions introduced plain-crypto-js as a dependency whose postinstall hook downloaded platform-specific RAT implants from sfrclak[.]com:8000, deploying three parallel implementations sharing identical C2 protocol and command structure. Google Threat Intelligence Group publicly attributed the compromise to UNC1069, a North Korea-nexus threat actor, based on use of WAVESHAPER.V2 backdoor and infrastructure overlaps with previous UNC1069 operations. The compromise was evident from npm metadata showing the maintainer email changed from [email protected] to [email protected] and publishing method shifted from trusted OIDC flow to direct CLI publish. The second-stage payloads function as lightweight RATs beaconing every 60 seconds with capabilities including remote shell execution, binary injection, directory browsing, process listing, and system reconnaissance.

MITRE ATT&CK Mapping

TechniqueIDContext
Supply Chain CompromiseT1195.002Compromise of software supply chain through hijacking of npm maintainer account and publication of malicious package versions
Command and Scripting InterpreterT1059.007JavaScript-based dropper executing postinstall hooks to download and execute platform-specific RAT payloads
Ingress Tool TransferT1105Download of platform-specific RAT implants from C2 server during postinstall execution
Application Layer ProtocolT1071.001HTTP-based C2 communication with 60-second beacon intervals for command and control
System Information DiscoveryT1082RAT performs immediate system reconnaissance including user directories, filesystem enumeration, and process listing

IOCs

Domains

sfrclak.com

Full URL Paths

sfrclak.com:8000

Splunk Format

"sfrclak.com" OR "sfrclak.com:8000"

File Hashes

2553649f232204966871cea80a5d0d6adc700ca
d6f3f62fd3b9f5432f5782b62d8cfd5247d5ee71
07d889e2dadce6f3910dcbc253317d28ca61c766
e10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09

Package Indicators

npm:[email protected]
npm:[email protected]
npm:[email protected]

Detection Recommendations

Monitor web proxy logs for outbound connections to sfrclak.com:8000. Search EDR logs for npm postinstall script execution with network connectivity during March 31, 2026 timeframe. Check CI/CD pipeline logs for axios package installations between 00:21-03:15 UTC March 31. Monitor for Registry Run key modifications on Windows systems and persistent batch file creation in %PROGRAMDATA%. Use YARA rule G_Backdoor_WAVESHAPER.V2_PS_1 for PowerShell variant detection. Audit package-lock.json and yarn.lock files for axios versions 1.14.1/0.30.4 and plain-crypto-js dependency presence.

References