UNC1069 Axios Supply Chain Attack: How Social Engineering Compromised npm and Deployed WAVESHAPER Malware

By Imthiyaz Ali
UNC1069 Axios Supply Chain Attack: How Social Engineering Compromised npm and Deployed WAVESHAPER Malware

A sophisticated supply chain attack attributed to the threat group UNC1069 has exposed critical vulnerabilities in the open-source ecosystem. By targeting the maintainer of the widely used Axios JavaScript library, attackers successfully published trojanized versions of the package on npm, potentially impacting millions of applications worldwide.

This incident highlights the growing trend of social engineering attacks against open-source maintainers, where a single compromised account can cascade into widespread ecosystem compromise.


Overview of the Attack

The attack began with a highly targeted social engineering campaign aimed at gaining access to the Axios maintainer’s credentials. Once successful, the attackers leveraged this access to:

  • Publish malicious versions of the Axios package to npm
  • Embed a remote access trojan known as WAVESHAPER.V2
  • Distribute the compromised package to unsuspecting developers and systems

Axios is downloaded over tens of millions of times weekly, making it a high-value target for supply chain compromise.


Who is UNC1069?

UNC1069 is a threat cluster believed to be linked to North Korean cyber operations. The group is known for:

  • Advanced social engineering campaigns
  • Targeting developers and cryptocurrency platforms
  • Deploying stealthy malware implants

Their operations often focus on financial gain and intelligence gathering, leveraging trusted software ecosystems as entry points.


Social Engineering: The Entry Point

Unlike traditional exploits, this attack relied on manipulating human trust rather than exploiting code vulnerabilities.

Key tactics included:

  • Impersonation of trusted contacts or collaborators
  • Phishing messages designed to harvest credentials
  • Convincing the maintainer to unknowingly grant access

This method bypasses technical defenses, making it one of the most effective attack vectors in modern cybersecurity.


WAVESHAPER.V2: The Malware Payload

The compromised Axios versions included a malicious implant identified as WAVESHAPER.V2, a remote access tool (RAT) designed for stealth and persistence.

Capabilities of WAVESHAPER.V2 include:

  • Remote command execution
  • Data exfiltration
  • System reconnaissance
  • Persistence mechanisms to evade detection

Once installed via the infected package, the malware could provide attackers with ongoing access to affected systems.


Impact on the npm Ecosystem

The attack underscores the systemic risks inherent in modern software development, where applications rely heavily on third-party dependencies.

Key statistics:

  • Axios is used by millions of applications globally
  • npm hosts over 2 million packages
  • Average projects depend on 100+ external libraries

This interconnected ecosystem means that a single compromised package can have a massive ripple effect.


Why Supply Chain Attacks Are Increasing

Attackers are increasingly targeting supply chains because they offer:

  • Scalability: One compromise affects thousands of downstream users
  • Trust exploitation: Developers trust popular packages
  • Stealth: Malicious code blends into legitimate updates

Recent years have seen a surge in such attacks, including incidents involving widely used libraries and development tools.


Security Lessons for Developers and Organizations

This attack provides critical lessons for securing the software supply chain:

  • Enable multi-factor authentication (MFA) for maintainers
  • Monitor package updates and version changes closely
  • Use dependency scanning tools to detect anomalies
  • Implement strict access controls for publishing rights
  • Adopt zero-trust principles in development pipelines

Organizations should also maintain a Software Bill of Materials (SBOM) to track dependencies and vulnerabilities.


Broader Implications

The UNC1069 Axios compromise demonstrates that:

  • Human factors remain the weakest link in cybersecurity
  • Open-source ecosystems are high-value targets
  • Supply chain attacks will continue to evolve in sophistication

As software becomes increasingly interconnected, securing the development pipeline is no longer optional — it is essential.


Our Assessment

The Axios supply chain attack is a stark reminder of how trust can be weaponized in the digital age. By compromising a single maintainer through social engineering, attackers were able to infiltrate one of the most widely used JavaScript libraries.

Defending against such threats requires a combination of technical safeguards, user awareness, and ecosystem-wide vigilance. As threat actors like UNC1069 continue to innovate, the security of open-source software will remain a critical battleground.


Reference Links and Sources

Imthiyaz Ali
Imthiyaz Ali
Imtiyaz is an experienced Cybersecurity Professional with over 5 years of experience in Cybersecurity Research.