Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
ZiChatBot Malware Uses Zulip APIs for Command & REST Control
May 8, 2026
Hackers Use Hugging Face & ClawHub to Deploy Malware
May 8, 2026
Fake Moustache Bypasses Age Verification, Raises Online Safety
May 8, 2026
Home/Threats/North Korea Hackers Compromise Axios npm in Supply Chain Attack
Threats

North Korea Hackers Compromise Axios npm in Supply Chain Attack

A North Korea-linked threat group has successfully hijacked one of the internet’s most widely used JavaScript libraries, injecting malware into millions of potential development environments....

Emy Elsamnoudy
Emy Elsamnoudy
April 3, 2026 3 Min Read
8 0

A North Korea-linked threat group has successfully hijacked one of the internet’s most widely used JavaScript libraries, injecting malware into millions of potential development environments. This significant supply chain attack, detailed in a <a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/1114606

On March 31, 2026, attackers gained access to the Axios Node Package Manager (npm) package using stolen maintainer credentials, turning a trusted tool into a weapon against unsuspecting developers worldwide.

Axios is an HTTP client library that helps developers send web requests from their applications. It is downloaded more than 100,000 times every week, making it a high-value target for any attacker looking to reach a large number of systems quietly and quickly.

By compromising this package, the threat actors positioned themselves to deliver malware silently to anyone who installed or updated the Axios package during the window of compromise.

CrowdStrike Counter Adversary Operations researchers identified this activity and attributed it with moderate confidence to a North Korean threat group tracked as STARDUST CHOLLIMA.

Analysts noted that the attackers deployed updated variants of a malware family called ZshBucket — a tool exclusively tied to STARDUST CHOLLIMA — targeting Linux, macOS, and Windows systems.

While infrastructure overlaps with another North Korean group called FAMOUS CHOLLIMA were observed, the technical sophistication of the ZshBucket variants in this attack pointed more strongly toward STARDUST CHOLLIMA as the primary actor.

The broader impact of this attack is difficult to overstate. STARDUST CHOLLIMA has a well-documented history of targeting cryptocurrency holders and fintech companies through supply chain compromises involving npm and PyPI repositories.

Given that Axios is embedded in countless web applications and developer workflows worldwide, the group’s ability to reach financial targets at scale through a single compromised package is a serious concern.

CrowdStrike assesses that financial gain — specifically currency generation — was the most likely motivation, consistent with the group’s long-standing operational pattern.

Since the end of 2025, STARDUST CHOLLIMA has significantly increased its operational pace, and this incident reflects the group’s intent to scale further.

The exact number of affected users remains unclear, but the sheer size of the Axios package’s weekly download volume signals that this supply chain compromise could have far-reaching consequences across the global software development community.

ZshBucket’s Expanded Command Capabilities

What makes this attack particularly alarming is how much more capable the new version of ZshBucket has become. In previous campaigns, ZshBucket was only able to download and execute files — a relatively straightforward function.

In this incident, the malware received a significant upgrade that gave attackers far greater control over compromised systems.

The updated ZshBucket variants now use a common JSON-based messaging protocol that works consistently across Linux, macOS, and Windows systems. This standardization allows operators to manage all infected machines through one unified communication channel.

The malware connects to a command-and-control server at the domain sfrclak[.]com, hosted at the IP address 142.11.206[.]73.

Operators can inject binary payloads into victim machines, execute arbitrary scripts and commands, enumerate the file system, and remotely terminate the malware implant when needed. The C2 infrastructure also reveals deeper ties to North Korean cyber operations.

The domain sfrclak[.]com shares identifying server characteristics with two additional IP addresses — 23.254.203[.]244, a known STARDUST CHOLLIMA address active since December 2025, and 23.254.167[.]216, previously used as a C2 server for FAMOUS CHOLLIMA’s InvisibleFerret malware in May 2025. The domain is registered through Hostwinds, consistent with prior STARDUST CHOLLIMA infrastructure patterns.

Developers using the Axios npm package should immediately audit their environments for signs of compromise.

Organizations are advised to verify package integrity before deployment, enable software composition analysis tools within CI/CD pipelines, rotate any credentials linked to npm maintainer accounts, and closely monitor outbound connections for unusual traffic to unknown domains.

Security teams should treat any communication with sfrclak[.]com or its associated IP addresses as a strong indicator of compromise and investigate those systems without delay.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwareSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

North Korea Uses GitHub C2 in New LNK Korea-Related Campaign

Next Post

CERT-EU Confirms Trivy Attack Breached Supply Chain

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DarkMoon AI Autonomous Pen Testing Platform with 50+
May 8, 2026
RansomHouse Claims Access to Trellix Source Code Breach Parts
May 8, 2026
PCPJack Worm Targets Docker, Kubernetes, Redis Credential
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us