📰 Full Story
On March 31, 2026, researchers discovered a supply‑chain compromise of Axios — a widely used JavaScript HTTP client with roughly 80–100 million weekly downloads — after attackers published two malicious versions (1.14.1 and 0.30.4) to the npm registry.
The intruders, who Google’s Threat Intelligence Group attributed to a North Korea‑nexus actor tracked as UNC1069, hijacked a maintainer account (jasonsaayman) and injected a bogus dependency (plain-crypto-js@4.2.1) that deployed a cross‑platform remote access trojan (WAVESHAPER.V2) targeting Windows, macOS and Linux.
The poisoned releases were live for only a few hours but could have been pulled into millions of downstream projects and CI/CD pipelines.
Security firms including StepSecurity, Elastic, Wiz and Huntress helped identify the campaign, which bypassed OIDC/GitHub Actions protections by using a long‑lived npm token and direct CLI publishes.
Google warned of broad ripple effects — credential theft, SaaS and cloud compromises, ransomware, extortion and cryptocurrency theft — and advised immediate auditing of lockfiles, rotation of secrets and remediation of potentially compromised developer machines.






💬 Commentary