CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 07, 2026

Axios Attack Shows Social Complex Engineering Is Industrialized

Dark Reading Archived Apr 07, 2026 ✓ Full text saved

The attack on the popular NPM package Axios is just one of many targeting maintainers and has shone a light on how threat actors can scale sophisticated social engineering campaigns.

Full text archived locally
✦ AI Summary · Claude Sonnet


    THREAT INTELLIGENCE DATA PRIVACY IDENTITY & ACCESS MANAGEMENT SECURITY CYBER RISK NEWS Axios Attack Shows Social Complex Engineering Is Industrialized The attack on the popular NPM package Axios is just one of many targeting maintainers and has shone a light on how threat actors can scale sophisticated social engineering campaigns. Alexander Culafi,Senior News Writer,Dark Reading April 6, 2026 4 Min Read SOURCE: ARTERRA PICTURE LIBRARY VIA ALAMY STOCK PHOTO The Axios attack has highlighted the sophistication, scalability, and industrialization of social engineering attacks.  Late last month, the NPM package of Axios, an extremely popular JavaScript HTTP client library, was compromised in a social engineering attack. A threat actor, believed to be North Korean threat group UNC1069, compromised lead maintainer Jason Saayman's account. The actor then published two malicious versions to NPM, which each contained a new malicious dependency containing a remote access Trojan (RAT), which would infect developers unfortunate enough to install the malicious updates.  The software development community jumped on the attack quickly and malicious versions were removed within a few hours, but Axios is downloaded more than 100 million times per week.  In a post-mortem on GitHub, Saayman wrote that the lead maintainer was deceived in a social engineering campaign that began two weeks prior to the attack, and the Axios team was in the process of investigating exactly how the compromise occurred.  Related:Blast Radius of TeamPCP Attacks Expands Amid Hacker Infighting The maintainer said threat actors reached out as the founder of a company, cloning the founder's likeness as well as the company. The attackers invited Saayman to a real Slack Workspace, which had multiple active channels and was "super convincing." The maintainer was then invited to a meeting to connect on Microsoft Teams, and when he joined, he was prompted to install a missing file, as their system was "out of date." When Saayman installed the missing item, it was revealed to be the RAT that was spread through the NPM package.  One additional detail the maintainer noted was that the RAT provided full "unilateral" control over their computer, even though two-factor authentication (2FA) was enabled for his NPM account.  Not Just Axios The threat campaign that led to Axios' compromise seemingly also targeted a wide range of users and executives. Security researcher Taylor Monahan (@tayvano) posted a detailed technical breakdown of the social engineering campaign in the post-mortem thread as well. She wrote that the attackers spend a lot of time leading up to the call where the target is compromised. There's no urgency, no one-click phish, calls get rescheduled, and so on; it's a tool to disarm the target. Monahan posited that these specific North Korean actors for years have targeted cryptocurrency founders, venture capital executives, and public people with social engineering attacks to get what they want. Sometimes it's an info or cryptocurrency stealer. Sometimes it's long-term access, or to install keyloggers. The researcher emphasized that once the attackers are in, things like 2FA no longer matter.  Related:Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations Development security vendor Socket published research detailing this extensive campaign late last week observing that many members of the open source software community have been targeted to date; that includes a number of Socket engineers as well as the company's CEO, Feross Aboukhadijeh, who has created or participated in the development of dozens of widely used NPM packages. Plenty of other developers and tech executives were targeted by the same playbook of slow-burn social engineering attacks.  These are people with direct access to software packages that are downloaded millions of times each week. If an attacker can compromise even a handful of people with that kind of critical access, it's easy to see how the Axios breach might not remain an isolated incident, especially considering Shai-hulud, GlassWorm, and other campaigns that have put the development community on the back foot in recent months.  A More Industrialized Social Engineering Landscape Sarah Kern, principal threat researcher at Sophos, says the Axios attack reflects the kind of social engineering campaign the Democratic People's Republic of Korea (DPRK) has been conducting for years. "While it only takes one high-value victim for a widescale attack like we've seen with the Axios supply chain, these threat actors are plotting these schemes full time with the backing of the North Korean regime," she says.  Related:China Upgrades the Backdoor It Uses to Spy on Telcos Globally Aboukhadijeh tells Dark Reading that there has been a meaningful shift, where these kinds of social engineering attacks were historically reserved for high-value individuals like cryptocurrency founders and executives with direct access to money. Yet, "the potential reach changes completely when you point that same playbook at open source maintainers." "One successful compromise doesn't get you one wallet. It gets you write access to a package downloaded hundreds of millions of times a week, with a blast radius that extends to every organization running that code. That's a fundamentally different threat model, and it scales in a way that traditional social engineering never did," Aboukhadijeh says.  As for why this is happening, he says a few things have converged. AI has dramatically lowered the cost of building trust (thanks to the ability for threat actors to generate convincing personas and maintain coherent conversations even with language barriers), ClickFix and similar delivery mechanisms have made payload delivery frictionless, and attacker tooling has matured significantly.  Tom Hegel, distinguished threat researcher at SentinelOne, says attacker operational infrastructure has matured, particularly when speaking of a sophisticated threat actor like a North Korean state-sponsored threat group.  "The slow-burn approach used to be expensive in terms of human attention, which naturally capped scale," he tells Dark Reading. "That constraint is loosening, and we should treat this as a permanent shift in the threat landscape rather than a spike." About the Author Alexander Culafi Senior News Writer, Dark Reading Alex is an award-winning writer, journalist, and podcast host based in Boston. After cutting his teeth writing for independent gaming publications as a teenager, he graduated from Emerson College in 2016 with a Bachelor of Science in journalism. He has previously been published on VentureFizz, Search Security, Nintendo World Report, and elsewhere. In his spare time, Alex hosts the weekly Nintendo podcast Talk Nintendo Podcast and works on personal writing projects, including two previously self-published science fiction novels. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports AI SOC for MDR: The Structural Evolution of Managed Detection and Response How Enterprises Are Developing Secure Applications Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Gartner IGA Voice of the Customer 2026 Access More Research Webinars Identity Maturity Under Pressure: 2026 Findings and How to Catch Up Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN More Webinars You May Also Like THREAT INTELLIGENCE Iran's Cyber-Kinetic War Doctrine Takes Shape by Alexander Culafi MAR 06, 2026 THREAT INTELLIGENCE React2Shell Exploits Flood the Internet as Attacks Continue by Rob Wright DEC 12, 2025 THREAT INTELLIGENCE Chinese Gov't Fronts Trick the West to Obtain Cyber Tech by Nate Nelson, Contributing Writer OCT 06, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 Editor's Choice CYBERSECURITY OPERATIONS RSAC 2026: AI Dominates, But Community Remains Key to Security byKristina Beek,Rob Wright APR 2, 2026 CYBERATTACKS & DATA BREACHES Not Toying Around: Hasbro Attack May Take 'Weeks' to Remediate byNate Nelson APR 2, 2026 3 MIN READ ENDPOINT SECURITY CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry byJeffrey Schwartz APR 3, 2026 3 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Identity Maturity Under Pressure: 2026 Findings and How to Catch Up WED, MAY 6,2026 AT 1PM EST Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST Securing Remote and Hybrid Work Forecast: Beyond the VPN TUES, MARCH 10, 2026 AT 1PM EST More Webinars White Papers How Sunrun Transformed Security Operations with AiStrike Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity Explore More White Papers BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Apr 07, 2026
    Archived
    Apr 07, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗