The Axios Hack Spotlight Cards
9 cards (intro + 8)
CYBER INCIDENT
The Axios Hack
How North Korean hackers turned a routine software install into a cyber weapon

@worldincards
CYBER INCIDENT
The Attack
On March 31, 2026, hackers slipped a hidden spy program into a popular software tool. Any developer who ran a routine install had their computer silently taken over, before the install even finished.
Window of danger
The poisoned software was live for about 3 hours before anyone noticed
Downloads per week
How many times this tool is normally downloaded every week
Seconds to infect
The spy program called home before the download even finished

@worldincards
Sources
The Attack
@worldincards
CYBER INCIDENT
Axios Library
Axios is a tool that helps apps talk to the internet. Most websites and apps you use daily rely on it behind the scenes, from online banking to food delivery to social media.
Downloads every week
One of the most popular software building blocks in the world
Apps built on it
Other tools and apps that depend on Axios to function
Of cloud systems use it
Found in 4 out of 5 cloud environments worldwide

@worldincards
Sources
Axios Library
@worldincards
CYBER INCIDENT
npm Registry
npm is like an app store for developers. When building apps, they download ready-made building blocks from npm. The catch: installing a package can secretly run code on your computer with full access to your files.
Packages available
Millions of building blocks developers can install with one command
Sandboxing
Downloaded code runs with full access to your files, passwords, and keys
Scripts run silently
Install scripts execute automatically without asking for permission

@worldincards
Sources
npm Registry
@worldincards
CYBER INCIDENT
Jason Saayman
The lead maintainer of Axios. Hackers stole his account credentials and used his trusted identity to publish the poisoned versions. It's like a thief stealing a pharmacist's keys to swap medicine on the shelves.
Account was all it took
One stolen login gave hackers the keys to the kingdom
Security disabled
Attackers changed the email address and disabled protections
UTC - first poison published
Released after midnight to maximize time before anyone noticed

@worldincards
Sources
Jason Saayman
@worldincards
CYBER INCIDENT
Blue Noroff
A North Korean government hacker group, also known as Sapphire Sleet. Part of the infamous Lazarus Group. They specialize in stealing cryptocurrency to fund the regime and have been active since at least 2018.
Active since
At least 8 years of sophisticated cyberattacks worldwide
State-sponsored
Backed by the North Korean government to generate revenue
Known aliases
UNC1069, Sapphire Sleet, TA444, CryptoCore, and more

@worldincards
CYBER INCIDENT
The Trojan
The hackers planted a Remote Access Trojan, a hidden spy program that gives full control over an infected computer. It could read files, steal passwords, run commands, and download more malware. Then it erased its own tracks.
Platforms targeted
Custom-built spy programs for Windows, Mac, and Linux
Check-in with hackers
The spy program contacted the hackers every 60 seconds for orders
Self-destructing
Deleted its own files after installing to avoid detection

@worldincards
Sources
The Trojan
@worldincards
CYBER INCIDENT
Step Security
The security company that first caught the attack and raised the alarm. Their AI-powered monitoring spotted the suspicious behavior within hours, limiting the damage before millions more could be infected.
Time to detect
Spotted and reported before the attack could spread further
How they caught it
Their AI Package Analyst flagged the hidden malicious dependency
Lines of Axios changed
The attackers never touched Axios itself, only added a hidden extra

@worldincards
Sources
Step Security
@worldincards
CYBER INCIDENT
The Fallout
Any developer who installed the poisoned version should assume their entire machine is compromised. Passwords, cloud keys, access tokens, everything. The full impact is still being uncovered weeks later.
Secrets at risk
Passwords, SSH keys, cloud tokens, API keys, everything on the machine
Warnings shown
No popup, no alert. The malware ran silently during a routine install
Recovery method
Affected machines should be wiped and rebuilt from scratch

@worldincards
Sources
The Fallout
@worldincards
9 cards · the axios hack