Google Threat Intelligence Group said a software supply chain attack briefly compromised the widely used JavaScript HTTP library axios on March 31, 2026, after an attacker appeared to have taken over the package maintainer account and published malicious versions 1.14.1 and 0.30.4.
What happened
Attackers did not appear to alter axios’s core visible functionality. Instead, they inserted a malicious dependency, plain-crypto-js, that used a postinstall script to execute automatically when the compromised package was installed. GTIG said the script, setup.js, served as an obfuscated loader that contacted attacker-controlled infrastructure and delivered platform-specific payloads to Windows, macOS, and Linux systems.
Google attributed the activity to UNC1069, a North Korea-nexus threat actor, and said the final payload was WAVESHAPER.V2, a remote access backdoor capable of gathering system information, executing commands, and enumerating files. Microsoft separately warned that any system that installed the affected axios versions should be treated as potentially compromised because the malicious code could execute during normal npm install or update workflows on developer workstations and CI/CD environments. Defenders said safe downgrade targets included axios 1.14.0 or earlier and 0.30.3 or earlier while incident response teams investigate whether credentials, secrets, or build environments were exposed.
What was said
According to Microsoft Security, “two new npm packages for updated versions of Axios, a popular HTTP client for JavaScript that simplifies making HTTP requests to a REST endpoint with over 70 million weekly downloads, were identified as malicious. These versions (1.14.1 and 0.30.4) were injected with a malicious dependency to download payloads from known actor command and control (C2). Microsoft Threat Intelligence has attributed this infrastructure and the Axios npm compromise to Sapphire Sleet, a North Korean state actor.”
Why it matters
Modern providers depend on third-party code across scheduling systems, billing platforms, telehealth tools, and internal web applications, so a poisoned dependency can spread risk into environments that handle sensitive data and support care delivery. A Cureus study notes “ransomware attacks has garnered particular notoriety, involving the encryption of critical data and a demand for ransom in exchange for its release. These attacks paralyze healthcare institutions, jeopardizing patient care, delaying treatments, and potentially leading to life-threatening situations.”
That matters here because a malicious package does not need to encrypt hospital systems to cause harm. It can trigger emergency patching, credential rotation, developer workstation isolation, build pipeline reviews, vendor checks, and service slowdowns at the same time healthcare teams are trying to keep clinical and administrative workflows moving. Paubox’s 2025 report on healthcare orgs admit email security failure adds useful context as 83% of healthcare IT leaders said legacy email systems already disrupt day-to-day operations. It shows how little spare capacity many teams have when a fast-moving security incident forces extra response work.
See also: HIPAA Compliant Email: The Definitive Guide (2026 Update)
FAQs
Why are developer workstations and CI/CD pipelines attractive targets?
Developer systems and build pipelines often have broad access to code repositories, secrets, credentials, and deployment workflows. That makes them valuable entry points for attackers looking to move deeper into an organization.
Why does a software supply chain incident matter to healthcare organizations?
Healthcare organizations rely on many connected applications to support scheduling, billing, communications, telehealth, and internal operations. A compromise in one trusted component can create security risk, operational disruption, and compliance pressure at the same time.
Does an attack have to cause ransomware to disrupt healthcare?
No. Even without encryption or extortion, an incident can still force emergency patching, credential resets, system isolation, vendor checks, and service slowdowns that strain already busy teams.
Subscribe to Paubox Weekly
Every Friday we bring you the most important news from Paubox. Our aim is to make you smarter, faster.
