Cyber Threat Pulse

**********NK UNC1069 breaches Axios software updates supply-chain + Patient crypto heist** [developing]

**********NK UNC1069 breaches Axios software updates supply-chain + Patient crypto heist** [developing]

Key Questions

What is the Axios supply-chain breach attributed to?

North Korea's UNC1069 group tampered with Axios software updates in a supply-chain attack. Google, CISA, and Mandiant confirmed the incident. It highlights risks in open-source software.

What financial impact did the UNC1069 activities have?

The group executed a $1.5B digital heist and a $280M crypto theft from Patient. Methods included developer hijacking and social engineering. This aligns with similar attacks on TrueConf, Cisco, and EU targets.

How was the Axios breach executed?

Attackers tampered with software updates via supply-chain compromise. It involved developer account hijacks and social engineering tactics. Open-source risks were exploited, as detailed in cybersecurity reports.

Which organizations confirmed the Axios supply-chain attack?

Google, CISA, and Mandiant verified the tampered updates. The breach was covered in Cybersecurity Today alongside EU cloud issues and React2Shell exploits. It underscores supply-chain vulnerabilities.

What other vulnerabilities or incidents are related to this highlight?

Critical flaws were found in Progress Software’s ShareFile service, potentially enabling breaches. The Axios incident ties into North Korea’s broader crypto heists and supply-chain attacks. EU cloud breaches and other exploits are similarly noted.

Tampered updates per Google/CISA/Mandiant; $1.5B+$280M crypto, dev hijack/social eng, open-source risks; aligns TrueConf/Cisco/EU + Progress ShareFile vulns.

Sources (3)
Updated Apr 8, 2026