Report: Hackers Tied to North Korea Compromise Axios Software to Attack American Companies; Concerns Over Cryptocurrency Theft

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

A sophisticated supply-chain breach, anticipated to entail an extensive recovery process, has reportedly been orchestrated by suspected North Korean hackers. This breach involves a widely-utilized software package serving thousands of companies across the United States, as detailed in a recent CNN report.

Cybersecurity experts engaged in the aftermath of the incident have conveyed to CNN their concerns regarding a long-term strategy aimed at pilfering cryptocurrency, a means by which the North Korean government allegedly finances its missile and nuclear development agendas.

Compromise of Axios Software

On Tuesday, hackers with potential ties to Pyongyang allegedly accessed a software developer’s account managing the open-source platform, Axios, for a duration exceeding three hours.

It is believed that they exploited this access to disseminate harmful updates to any enterprise that downloaded the software during that period, prompting an urgent response from the developer to reclaim control, while cybersecurity personnel nationwide scrambled to evaluate the ramifications of the breach.

Axios software is integral to various sectors within the U.S. economy, encompassing industries from healthcare to finance. Additionally, it finds application among cryptocurrency enterprises and technology firms engaged within the crypto realm.

Mandiant Attributes Blame to North Korean Hackers

As reported by Mandiant, a cybersecurity firm under Google’s umbrella, a suspected North Korean hacking collective is implicated in this recent breach.

Charles Carmakal, Mandiant’s chief technology officer, indicated, “We foresee efforts to exploit the credentials and system access amassed through this supply chain assault to target and appropriate cryptocurrency from businesses,” and warned that “the cascading effects of this operation may take months to fully determine.”

Identification of 135 Compromised Devices

Security researcher John Hammond from Huntress reported the identification of approximately 135 compromised devices belonging to a minimum of 12 organizations.

However, he cautioned that this figure is merely a fractional representation of the total affected entities, suggesting that the actual number may escalate as more businesses uncover the breach.

A Series of Attacks from North Korea

This incident is merely the latest in a series of extensive supply-chain assaults attributed to Pyongyang.

Nearly three years prior, North Korean operatives reportedly infiltrated another prominent software provider essential for voice and video communications relied upon by healthcare institutions and hotel chains.

North Korea’s cyber espionage and hacking divisions serve as a vital revenue stream for the sanctions-battered nation. United Nations and independent reports suggest that hackers associated with North Korea have pilfered billions from financial institutions and cryptocurrency firms over recent years.

In 2025 alone, these hackers executed a monumental theft, securing $1.5 billion in cryptocurrency during a single breach—an event that ranked as the most significant crypto hack to date.

A White House official previously indicated that approximately fifty percent of the financing for North Korea’s missile initiatives derives from such digital larcenies.

Ben Read, director of strategic threat intelligence at Wiz, noted that North Korea operates without concern for its public image or the probability of identification.

He remarked that while these operations tend to be conspicuous and highly visible, the risk is one they are willing to undertake.

Hammond characterized the timing of the hack as “exquisitely calibrated,” attributing it to the burgeoning adoption of artificial intelligence (AI) agents that develop software within organizations, often lacking proper oversight and safeguards.

white and black typewriter with white printer paper

He further asserted that the primary vulnerability within the software supply chain today stems from an alarming reduction in scrutiny over utilized components, effectively inviting exploitation.

Source link: Livemint.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

Neil Hemmings

I'm Neil Hemmings from Anaheim, CA, with an Associate of Science in Computer Science from Diablo Valley College. As Senior Tech Associate and Content Manager at RS Web Solutions, I write about AI, gadgets, cybersecurity, and apps – sharing hands-on reviews, tutorials, and practical tech insights.
Share the Love
Related News Worth Reading