Social Engineering Attacks on Open Source Developers Are Escalating
4 Articles
4 Articles
"You have to feel bad for anyone duped by such an elaborate ploy": How a fake Microsoft Teams update helped North Korean hackers compromise countless Windows PCs
When you buy through links on our articles, Future and its syndication partners may earn a commission. It's been about a week since suspected hackers out of North Korea temporarily compromised axios, one of the world's most popular JavaScript HTTP client libraries. Now, more details are emerging…
A software used by hundreds of millions of developers every week, compromised in a few hours by North Korean hackers. On March 31, 2026, Axios, a must-have JavaScript library, almost became a weapon of mass hacking. Hacking open source software targeted its main developer Hacking open source software as popular as Axios did not start with a technical flaw. Everything started two weeks before the attack with a carefully orchestrated approach. hac…
Social engineering attacks on open source developers are escalating - National Cyber Security Consulting
North Korean hackers spent weeks socially engineering an Axios maintainer through a fake Slack workspace, a cloned company identity, and a fabricated Microsoft Teams call that tricked him into installing a RAT posings as a software update. They used the access they gained to inject malware into npm packages downloaded 100+ million times a week. […] Thank you for subscribing to our RSS feed! The post Social engineering attacks on open source deve…
Social engineering attacks on open source developers are escalating
North Korean hackers spent weeks socially engineering an Axios maintainer through a fake Slack workspace, a cloned company identity, and a fabricated Microsoft Teams call that tricked him into installing a RAT posings as a software update. They used the access they gained to inject malware into npm packages downloaded 100+ million times a week. Now, a fresh Open Source Security Foundation (OpenSSF) advisory warns unknown attackers are using a si…
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium

