{"id":3165,"date":"2026-04-11T10:00:00","date_gmt":"2026-04-11T15:00:00","guid":{"rendered":"https:\/\/techy44.okdiario.com\/en\/?p=3165"},"modified":"2026-04-09T18:37:39","modified_gmt":"2026-04-09T23:37:39","slug":"north-korea-is-turning-crypto-into-a-war-chest-again-and-the-new-us-warning-suggests-the-next-heist-may-be-bigger-than-anyone-wants-to-admit","status":"publish","type":"post","link":"https:\/\/techy44.okdiario.com\/en\/north-korea-is-turning-crypto-into-a-war-chest-again-and-the-new-us-warning-suggests-the-next-heist-may-be-bigger-than-anyone-wants-to-admit\/3165\/","title":{"rendered":"North Korea is turning crypto into a war chest again, and the new US warning suggests the next heist may be bigger than anyone wants to admit"},"content":{"rendered":"\n<p>For a few hours this week, one of the internet\u2019s most common building blocks turned into a malware delivery system. Attackers slipped a malicious dependency into Axios, a JavaScript library downloaded tens of millions of times a week, and anyone pulling the wrong version could have installed a remote access trojan without realizing it.<\/p>\n\n\n\n<p>It sounds like a niche developer story, until you remember how much of the modern climate economy runs on code. From <a href=\"https:\/\/techy44.okdiario.com\/en\/elon-musk-is-chasing-chinese-solar-power-for-america-while-africa-braces-for-higher-panel-costs-exposing-who-still-pays-when-beijing-changes-the-rules\/2804\/\">solar installers<\/a> scheduling crews to utilities balancing the grid during intense summer heat, the same software supply chain sits underneath it all.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A three-hour window with a long tail<\/h2>\n\n\n\n<p>Google\u2019s Threat Intelligence Group says the poisoned axios releases were available for roughly three hours before being removed. That is plenty of time for automated build systems to pull updates while everyone is asleep. <\/p>\n\n\n\n<div class=\"gb-element-a00da4e5\">\n<div><div class=\"gb-looper-46613eed\">\n<div class=\"gb-loop-item gb-loop-item-a8390598 post-2171 post type-post status-publish format-standard has-post-thumbnail hentry category-military-defense resize-featured-image\">\n<h4 class=\"gb-text gb-text-24a51617\">Also Read: <a href=\"https:\/\/techy44.okdiario.com\/en\/tensions-between-north-korea-and-seoul-are-rising-again-with-north-korea-demanding-more-after-controversial-drone-flights\/2171\/\">Tensions between North Korea and Seoul are rising again, with North Korea demanding more after controversial drone flights<\/a><\/h4>\n<\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<p>The affected versions were <a href=\"https:\/\/www.csa.gov.sg\/alerts-and-advisories\/advisories\/ad-2026-002\/\" target=\"_blank\" rel=\"noopener\">1.14.1 and 0.30.4<\/a>, and both pulled in a malicious package named plain-crypto-js. Microsoft warns that install-time code execution and auto-updates can push the compromise beyond a single laptop and into CI systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What was actually compromised<\/h2>\n\n\n\n<p>This was not a flaw in axios\u2019s normal features. Researchers say the attackers inserted a dependency that runs during installation through a postinstall script, so an app can behave normally while secrets leak in the background. <\/p>\n\n\n\n<p>Google describes the payload as a dropper that deploys the WAVESHAPER.V2 backdoor, while Microsoft links the infrastructure to a North Korea state actor it tracks as Sapphire Sleet. Different labels, same direction of travel, because both investigations point to a North Korea nexus hunting credentials and persistent access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Crypto theft is the business model<\/h2>\n\n\n\n<p>North Korea\u2019s digital theft has a military and defense shadow. <a href=\"https:\/\/www.fbi.gov\/investigate\/cyber\/alerts\/2025\/north-korea-responsible-for-1-5-billion-bybit-hack\" target=\"_blank\" rel=\"noopener\">The FBI<\/a> said North Korea was responsible for a roughly $1.5 billion virtual asset theft from the crypto exchange Bybit in February 2025, and U.S. officials have long warned these proceeds help sustain weapons programs.<\/p>\n\n\n\n<div class=\"gb-element-ed320bec\">\n<div><div class=\"gb-looper-d968d793\">\n<div class=\"gb-loop-item gb-loop-item-70f55926 post-2385 post type-post status-publish format-standard has-post-thumbnail hentry category-military-defense resize-featured-image\">\n<h4 class=\"gb-text gb-text-a5483977\">Also Read: <a href=\"https:\/\/techy44.okdiario.com\/en\/a-senior-u-s-navy-officer-receives-an-extraordinary-honor-in-south-korea\/2385\/\">A senior U.S. Navy officer receives an extraordinary honor in South Korea<\/a><\/h4>\n<\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<p>Chainalysis estimates North Korea-linked hackers stole about $2.02 billion in cryptocurrency in 2025, a jump that suggests fewer attacks can still mean larger payouts. If that money trail is the motive, supply chain attacks on widely used developer tools are an efficient way to scale. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1800\" height=\"1013\" src=\"https:\/\/techy44.okdiario.com\/en\/wp-content\/uploads\/2026\/04\/north-korea-crypto-war-chest-heist-warning-1.jpg\" alt=\"A hooded hacker silhouette overlaid on glowing green computer code and a cryptocurrency logo.\" class=\"wp-image-3167\" title=\"\" srcset=\"https:\/\/techy44.okdiario.com\/en\/wp-content\/uploads\/2026\/04\/north-korea-crypto-war-chest-heist-warning-1.jpg 1800w, https:\/\/techy44.okdiario.com\/en\/wp-content\/uploads\/2026\/04\/north-korea-crypto-war-chest-heist-warning-1-300x169.jpg 300w, https:\/\/techy44.okdiario.com\/en\/wp-content\/uploads\/2026\/04\/north-korea-crypto-war-chest-heist-warning-1-768x432.jpg 768w, https:\/\/techy44.okdiario.com\/en\/wp-content\/uploads\/2026\/04\/north-korea-crypto-war-chest-heist-warning-1-1536x864.jpg 1536w, https:\/\/techy44.okdiario.com\/en\/wp-content\/uploads\/2026\/04\/north-korea-crypto-war-chest-heist-warning-1-150x84.jpg 150w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><figcaption class=\"wp-element-caption\">North Korean hackers recently compromised the popular Axios software library to deploy malware and steal cryptocurrency from massive networks.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">The environmental connection is closer than it looks<\/h2>\n\n\n\n<p><a href=\"https:\/\/techy44.okdiario.com\/en\/offshore-wind-turbines-may-be-turning-into-ai-data-centers-and-the-idea-could-solve-one-of-the-industrys-biggest-problems-where-the-cold-never-runs-out\/3007\/\">Clean tech<\/a> and conservation projects use the same cloud stacks, web dashboards, and open-source dependencies as everyone else. Energy companies are already under sustained cyber pressure, with <a href=\"https:\/\/www.sophos.com\/en-us\/blog\/the-state-of-ransomware-in-critical-infrastructure-2024\" target=\"_blank\" rel=\"noopener\">Sophos<\/a> reporting 67% of energy, oil, gas, and utilities organizations were hit by ransomware in 2024 and average recovery costs around $3.12 million. <\/p>\n\n\n\n<p>Then there is the crypto angle. Bitcoin\u2019s electricity use is large enough that Cambridge runs a dedicated electricity consumption index, and the steady churn of theft and laundering keeps criminal attention locked on a sector with real energy and climate tradeoffs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What businesses should do next<\/h2>\n\n\n\n<p>Start with a simple check. Google and Microsoft both urge organizations to identify whether Axios 1.14.1 or 0.30.4 was installed anywhere, downgrade to known safe versions, and rotate secrets immediately if exposure is possible.<\/p>\n\n\n\n<p>After the urgent cleanup, treat software ingredients like supply chain essentials, not trivia. NIST describes an <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/sbom\" target=\"_blank\" rel=\"noopener\">SBOM<\/a> as a formal record of software components and their relationships, and that kind of visibility matters even more as open source consumption hits machine scale.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The bigger lesson for open source and AI coding<\/h2>\n\n\n\n<p>Sonatype says open source downloads across major registries reached 9.8 trillion in 2025 and it tracks more than 1.2 million malicious packages. That is the backdrop for why \u201cjust review the code\u201d no longer works for the most part.<\/p>\n\n\n\n<div class=\"gb-element-84e72bf4\">\n<div><div class=\"gb-looper-14723d62\">\n<div class=\"gb-loop-item gb-loop-item-3da2d3b6 post-3107 post type-post status-publish format-standard has-post-thumbnail hentry category-tech resize-featured-image\">\n<h4 class=\"gb-text gb-text-c8c6ea5e\">Also Read: <a href=\"https:\/\/techy44.okdiario.com\/en\/china-just-changed-what-a-cheap-tv-gadget-can-do-because-this-pocket-sized-stick-can-turn-almost-any-screen-into-a-smart-entertainment-hub\/3107\/\">China just changed what a cheap TV gadget can do, because this pocket-sized stick can turn almost any screen into a smart entertainment hub<\/a><\/h4>\n<\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<p>AI-assisted <a href=\"https:\/\/techy44.okdiario.com\/en\/openai-is-shutting-sora-after-betting-big-on-ai-video-and-the-abrupt-move-is-raising-a-bigger-question-about-what-the-company-now-sees-as-worth-keeping\/2898\/\">development<\/a> adds another twist. Sonatype cites IDC research indicating developers accept an average of 39% of AI-generated code without revision, which can turn bad dependency choices into fast-moving defaults.<\/p>\n\n\n\n<p>At the end of the day, the Axios incident is a reminder that the energy transition inherits the internet\u2019s trust problems. If the tools that move data can be quietly subverted, the impact will not stay on a developer screen, it can show up when systems fail and the <a href=\"https:\/\/techy44.okdiario.com\/en\/not-even-50-tariffs-can-save-aluminum-the-united-states-loses-another-major-smelter-as-electricity-costs-drive-the-market-century-closes-hawesville-permanently-252000-tons-per-year-and-the-void\/1980\/\">electric bill<\/a> spikes.<\/p>\n\n\n\n<p>The official statement was published on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/04\/01\/mitigating-the-axios-npm-supply-chain-compromise\/\" target=\"_blank\" rel=\"noopener\"><em>Microsoft Security Blog<\/em><\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>For a few hours this week, one of the internet\u2019s most common building blocks turned into a malware delivery system. &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"North Korea is turning crypto into a war chest again, and the new US warning suggests the next heist may be bigger than anyone wants to admit\" class=\"read-more button\" href=\"https:\/\/techy44.okdiario.com\/en\/north-korea-is-turning-crypto-into-a-war-chest-again-and-the-new-us-warning-suggests-the-next-heist-may-be-bigger-than-anyone-wants-to-admit\/3165\/#more-3165\" aria-label=\"Read more about North Korea is turning crypto into a war chest again, and the new US warning suggests the next heist may be bigger than anyone wants to admit\">Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":3166,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-3165","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","resize-featured-image"],"_links":{"self":[{"href":"https:\/\/techy44.okdiario.com\/en\/wp-json\/wp\/v2\/posts\/3165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techy44.okdiario.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techy44.okdiario.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techy44.okdiario.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/techy44.okdiario.com\/en\/wp-json\/wp\/v2\/comments?post=3165"}],"version-history":[{"count":1,"href":"https:\/\/techy44.okdiario.com\/en\/wp-json\/wp\/v2\/posts\/3165\/revisions"}],"predecessor-version":[{"id":3168,"href":"https:\/\/techy44.okdiario.com\/en\/wp-json\/wp\/v2\/posts\/3165\/revisions\/3168"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techy44.okdiario.com\/en\/wp-json\/wp\/v2\/media\/3166"}],"wp:attachment":[{"href":"https:\/\/techy44.okdiario.com\/en\/wp-json\/wp\/v2\/media?parent=3165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techy44.okdiario.com\/en\/wp-json\/wp\/v2\/categories?post=3165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techy44.okdiario.com\/en\/wp-json\/wp\/v2\/tags?post=3165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}