Close Menu
AI News TodayAI News Today

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Claude comes for the design stack

    Chinese tech workers are starting to train their AI doubles–and pushing back

    GoPro’s new Mission cameras are priced beyond most weekend athletes

    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook X (Twitter) Instagram Pinterest Vimeo
    AI News TodayAI News Today
    • Home
    • Shop
    • AI News
    • AI Reviews
    • AI Tools
    • AI Tutorials
    • Chatbots
    • Free AI Tools
    AI News TodayAI News Today
    Home»AI Reviews»North Korea’s hijack of one of the web’s most used open source projects was likely weeks in the making
    AI Reviews

    North Korea’s hijack of one of the web’s most used open source projects was likely weeks in the making

    By No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    North Korean soldiers attend a mass rally to celebrate the North's declaration on November 29 it had achieved full nuclear statehood, on Kim Il-Sung Square in Pyongyang on December 1, 2017. North Korea's leader Kim Jong-Un declared the country had achieved a "historic cause" of becoming a nuclear state, its state media said on November 29, after the country tested an intercontinental ballistic missile earlier in the day.
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A North Korean cyberattack that last Monday briefly hijacked one of the most widely used open source projects on the web took weeks to carry out as part of a long-running campaign to target the code’s top developers.

    The hijacking of the Axios project on March 31 was in part successful because it relied on well-resourced hackers building rapport and trust with their intended target over a long period of time to increase their odds of a successful eventual compromise. This kind of hack highlights the security challenges that developers of popular open source projects can face, at a time when government hackers and cybercriminals alike are targeting widely used projects for their ability to access, in some cases, millions of devices worldwide.

    Jason Saayman, who maintains the popular Axios project that developers use to connect their apps to the internet, provided a postmortem with a timeline of the hack. He shared that the hackers began their targeting campaign around two weeks before eventually gaining control of his computer to push out malicious code.

    By posing as a real company, creating a realistic-looking Slack workspace, and using fake profiles of its employees to build credibility, Saayman said the suspected North Korean hackers then invited him into a web meeting that prompted him to download malware masquerading as an update necessary to access the call. Saayman said the lure mimicked a technique used by North Korean hackers that tricks would-be victims into granting the hackers remote access to their system, often to steal their cryptocurrency. 

    This attack, Saayman said, mimicked earlier hacks attributed to North Korea by security researchers at Google.

    After compromising and gaining remote access to Saayman’s computer, the hackers then released the malicious updates to the Axios project.

    The two malicious Axios packages, pulled some three hours after they were first published on March 31, may have still infected thousands of systems during that window, though the full breadth of the mass hack is not yet fully clear. Any computer that installed a malicious version of the software during this time may have allowed the hackers to steal their private keys, credentials, and passwords from that computer, which can lead to further breaches.

    Saayman did not immediately respond to an email with questions about the incident.

    North Korean hackers remain one of the most active cyber threats on the internet today, blamed for the theft of at least $2 billion in cryptocurrency in 2025 alone.

    The Kim Jong Un regime remains under international sanctions and banned from the global financial network for violating a ban on its nuclear weapons development program, which the country funds in large part by launching cyberattacks and stealing cryptocurrency.

    North Korea is believed to have thousands of highly organized hackers — the majority of whom are working against their will under the repressive Kim regime. These hackers spend weeks or months carrying out complex social engineering attacks aimed at gaining trust and eventually access to steal cryptocurrency and data to extort their victims.

    hijack Koreas making North open Projects source webs weeks
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleFrom folding boxes to fixing vacuums, GEN-1 robotics model hits 99% reliability
    Next Article Trump’s next budget once again calls for massive cuts to science
    • Website

    Related Posts

    AI Reviews

    Chinese tech workers are starting to train their AI doubles–and pushing back

    AI Reviews

    Disney Parks in 2026: Leia, Luke and Han Hit Galaxy’s Edge

    AI Reviews

    Millions of Satellites, but Who’s in Charge? It’s a Wild West in Space

    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Claude comes for the design stack

    0 Views

    Chinese tech workers are starting to train their AI doubles–and pushing back

    0 Views

    GoPro’s new Mission cameras are priced beyond most weekend athletes

    0 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    AI Tutorials

    Quantization from the ground up

    AI Tools

    David Sacks is done as AI czar — here’s what he’s doing instead

    AI Reviews

    Judge sides with Anthropic to temporarily block the Pentagon’s ban

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Claude comes for the design stack

    0 Views

    Chinese tech workers are starting to train their AI doubles–and pushing back

    0 Views

    GoPro’s new Mission cameras are priced beyond most weekend athletes

    0 Views
    Our Picks

    Quantization from the ground up

    David Sacks is done as AI czar — here’s what he’s doing instead

    Judge sides with Anthropic to temporarily block the Pentagon’s ban

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Terms & Conditions
    • Privacy Policy
    • Disclaimer

    © 2026 ainewstoday.co. All rights reserved. Designed by DD.

    Type above and press Enter to search. Press Esc to cancel.