_research / stardust-chollima-axios-npm-supply-chain-attack
RESEARCH ANALYSIS 9 min read PREMIUM

North Korean Threat Actor STARDUST CHOLLIMA Poisons the Axios npm Well in Sophisticated Supply Chain Strike

A North Korean state-linked actor likely compromised the widely-used Axios npm package, threatening millions of JavaScript projects worldwide with stealthy supply chain malware.

2026-04-15 · Source: CrowdStrike Blog
🔬
RESEARCH ANALYSIS

This analysis is based on research published by CrowdStrike Blog. CypherByte adds analysis, context, and security team recommendations.

Original research credit: CrowdStrike Blog. This article represents CypherByte's independent analysis and editorial perspective on the disclosed findings.

Executive Summary

CrowdStrike's adversary intelligence team has attributed a likely compromise of the axios npm package to STARDUST CHOLLIMA, a North Korean state-nexus threat actor with a well-documented history of financially motivated and espionage-driven cyber operations. The axios library — one of the most downloaded HTTP client packages in the JavaScript ecosystem with well over one billion weekly downloads — represents a crown jewel target for any adversary seeking broad, covert access across enterprise and open-source software supply chains. If confirmed at scale, this incident would rank among the most consequential software supply chain attacks ever recorded, eclipsing many of the incidents that have defined this threat category over the past five years.

Security teams responsible for JavaScript-heavy environments, DevSecOps pipelines, Node.js backend infrastructure, and any organization consuming open-source packages via npm should treat this disclosure as a critical-priority event. The attack vector here is not a traditional vulnerability — there is no CVE, no patch to apply in the conventional sense, and no single misconfigured endpoint to close. Instead, defenders are faced with a trust-chain compromise: the very mechanism organizations rely upon to safely consume third-party code has been weaponized. This demands immediate dependency auditing, integrity verification, and pipeline hardening across the board.

Key Finding: STARDUST CHOLLIMA's targeting of axios represents a deliberate, high-leverage supply chain strategy — compromising a single, universally trusted package to achieve silent, scalable downstream access across thousands of dependent applications and organizations simultaneously.

Technical Analysis

According to CrowdStrike's research, STARDUST CHOLLIMA likely gained the ability to publish or manipulate package versions within the axios npm namespace. The attack methodology aligns closely with patterns observed in prior DPRK-linked supply chain operations: adversaries target maintainer accounts — often through social engineering, credential theft, or session token hijacking — to obtain authenticated publish access to high-value package registries. Once inside, a malicious actor can introduce a trojanized version that appears legitimate to automated dependency resolution systems like npm install, yarn, or pnpm.

The tampered package likely contains embedded malicious logic designed to execute at install time or at runtime within consuming applications. North Korean threat actors operating under the CHOLLIMA cluster have historically favored payload patterns including: reconnaissance beacons that profile host environments, credential harvesting modules targeting cloud provider tokens (particularly AWS, GCP, and Azure credential files), cryptocurrency wallet drainers, and persistent backdoor implants that blend into legitimate application traffic. The sophistication here lies in the timing and subtlety — malicious code injected into a widely trusted library can persist undetected in production environments for extended periods, particularly where software bill of materials (SBOM) practices are immature or absent.

The likely attack chain proceeds as follows: (1) Maintainer account compromise via credential phishing or token theft; (2) Publication of a malicious version increment to the official npm registry, mimicking a routine patch or minor update; (3) Automatic uptake by downstream projects that specify loose version ranges (e.g., ^1.x.x or ~1.x.x) in their package.json manifests; (4) Execution of malicious payload within the context of the victim application's process and environment. Critically, npm's default trust model provides no cryptographic verification of package contents at the point of installation — a structural weakness that supply chain attackers have systematically exploited.

Attack Vector Summary: Maintainer credential compromise → Malicious version publication → Automatic downstream consumption via loose semver ranges → Silent payload execution in victim environments. No user interaction required beyond routine dependency updates.

Impact Assessment

axios is embedded in an extraordinary breadth of the JavaScript ecosystem. It is a direct or transitive dependency in millions of npm packages, countless enterprise Node.js applications, frontend React and Vue.js projects, serverless functions, CI/CD tooling, and developer utilities. The blast radius of a successfully trojanized axios release is therefore not measured in tens or hundreds of affected organizations — it is potentially measured in the tens of thousands. Organizations spanning financial services, technology, healthcare, defense contracting, and critical infrastructure sectors all carry axios within their dependency trees, often without explicit awareness.

The real-world consequences bifurcate along two threat vectors consistent with STARDUST CHOLLIMA's known mission priorities. First, financial theft: DPRK-linked actors have extensively targeted cryptocurrency exchanges, DeFi protocols, and fintech platforms — all of which heavily leverage JavaScript stacks and npm packages. A compromised axios installation in such an environment could exfiltrate API keys, private keys, and session tokens with devastating financial consequences. Second, espionage and persistent access: for defense, government, and technology sector targets, the implant provides a persistent, trusted foothold from which lateral movement, data exfiltration, and long-term intelligence collection can proceed under the cover of legitimate application network traffic.

CypherByte's Perspective

This incident crystallizes a systemic problem that the security community has long identified but the broader software industry has been slow to address: the npm ecosystem's trust model is fundamentally misaligned with the threat landscape it now faces. Package registries were architected for a collaborative, low-adversarial-stakes environment. Nation-state actors operating with the resources and patience of STARDUST CHOLLIMA exploit that architectural naivety with precision. The question is no longer whether high-value packages will be targeted — it is whether the infrastructure and practices consuming those packages are resilient enough to detect and contain the compromise.

From a broader software supply chain security standpoint, this event reinforces the urgency of several converging initiatives: mandatory SBOM generation and continuous monitoring, adoption of npm package signing via Sigstore and the npm provenance attestation framework, enforcement of package-lock.json integrity and hash pinning in production pipelines, and behavioral monitoring of npm install-time scripts. The Axios compromise is not an anomaly — it is a preview. As DPRK and other state-nexus actors increasingly recognize that software supply chains offer asymmetric leverage, the frequency and sophistication of these attacks will only escalate. Organizations that treat dependency security as a box-checking compliance exercise rather than a live threat surface will find themselves perpetually behind the adversary's tempo.

Indicators and Detection

Defenders should focus detection efforts across the following dimensions:

Package Integrity Verification: Compare the SHA-512 hash of installed axios package contents against known-good values published on the official npm registry. Any discrepancy between the package-lock.json resolved integrity field and independently verified hashes warrants immediate investigation. Tools such as npm audit, socket.dev, and Snyk can surface anomalous package behavior and unexpected dependency mutations.

Behavioral Indicators at Runtime: Monitor for axios-linked processes initiating unexpected outbound connections to non-application endpoints, particularly to dynamic DNS domains, newly registered infrastructure, or IP ranges associated with DPRK-nexus C2 clusters. Look for unusual file system activity (reads of ~/.aws/credentials, ~/.ssh/, environment variable dumps) originating from Node.js processes.

CI/CD Pipeline Anomalies: Alert on unexpected changes to resolved axios versions in build artifact logs, particularly in pipelines that do not enforce strict version pinning. Any pipeline that consumes a new axios version without an explicit developer-initiated upgrade is a red flag requiring manual review.

Detection Priority: Audit all environments for axios versions published in the suspected compromise window. Treat any hash mismatch or unexpected version bump as a potential indicator of compromise until cleared through forensic analysis.

Recommendations

1. Immediate Dependency Audit: Run a full inventory of axios versions deployed across all environments — development, staging, and production. Cross-reference installed versions against the npm registry's published integrity hashes. Prioritize environments handling sensitive credentials, financial data, or privileged cloud access.

2. Pin Dependencies Explicitly: Migrate from loose semver ranges to exact version pinning in package.json and commit package-lock.json or equivalent lock files to version control. Configure CI/CD systems to fail builds when lock file integrity cannot be verified.

3. Enable npm Provenance Attestations: Where available, require provenance-verified packages and enforce npm audit signatures checks in your pipeline. Adopt Sigstore-based verification for critical dependencies.

4. Implement Runtime Behavioral Monitoring: Deploy endpoint detection capabilities that can monitor Node.js process behavior for credential file access, anomalous network egress, and install-time script execution. EDR tools with JavaScript/Node.js runtime visibility are particularly valuable here.

5. Generate and Monitor SBOMs: Produce software bills of materials for all production applications and integrate continuous SBOM monitoring into your security operations workflow. New vulnerability or compromise disclosures — like this one — should trigger automated cross-referencing against your SBOM inventory.

6. Apply Threat Intelligence to npm Monitoring: Subscribe to feeds that track npm package anomalies, maintainer account changes, and unexpected version publications for your critical dependencies. Services such as Socket.dev, Phylum, and Deps.dev provide real-time signals on supply chain risk events.

7. Review Maintainer Access Controls: If your organization maintains any npm packages, enforce hardware MFA on all maintainer accounts, audit publish access permissions, and consider requiring multi-party approval for new version publications of critical packages.

CypherByte will continue monitoring developments related to this campaign as additional indicators and attribution details emerge. Organizations requiring assistance with dependency auditing, supply chain security architecture, or incident response related to this event are encouraged to engage our advisory team.

// TOPICS
#research#analysis
// WANT MORE LIKE THIS?

Get full access to all research analyses, deep-dive writeups, and premium threat intelligence.