A major attack on the JavaScript ecosystem's software supply chain has happened after a malicious dependency injection into the Axios NPM package, which is used by a lot of people This article explores platform compromise axios. . The poisoned releases added plain-crypto-js, which quietly installed the WAVESHAPER.V2 backdoor on Windows, macOS, and Linux systems.
Google told companies not to use axios versions 1.14.1 or 0.30.4. Instead, they should stick to known-good releases like 1.13.0 or earlier and 0.29.3 or earlier. Google said that the main point is clear: trusted open source packages can become entry points for hackers with very little warning and very little protection. The company said that UNC1069, a financially motivated North Korean threat actor, was behind the activity.
People think that the attacker probably got into the Axios maintainer account by hacking it.
In this case, the attackers used normal developer behavior, like installing packages, to go from a software update to a full cross-platform compromise. Because axios is part of so many dependency chains, businesses now need to look closely at not only direct installations but also inherited exposure across build pipelines, internal tools, and production services. If plain-crypto-js is present, defenders should assume that the malware may have spread beyond the first machine and check nearby systems for similar activity.
Speed is very important; early containment can reduce future threats. Follow LinkedIn, X to get updates right away. Make ZeroOwl your preferred source in Google. Follow ZeroOwl on Twitter and Facebook to get the latest news from ZeroOwl and other security experts.
If you need private help, call the Samaritans at 08457 90 90 90, go to a Samaritans branch near you, or go to www.samaritans.org. If you're in the U.S., you can call the National Suicide Prevention Lifeline at 1-800-273-8255.











.webp%3Fw%3D1068%26resize%3D1068%2C0%26ssl%3D1&w=3840&q=75)