Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    AI learning app Gizmo levels up with 13M users and a $22M investment

    April 16, 2026

    Feds will require data centers to show their power bills

    April 16, 2026

    LinkedIn data shows AI isn’t to blame for hiring decline… yet

    April 16, 2026
    Facebook Twitter Instagram
    • Tech
    • Gadgets
    • Spotlight
    • Gaming
    Facebook Twitter Instagram
    iGadgets TechiGadgets Tech
    Subscribe
    • Home
    • Gadgets
    • Insights
    • Apps

      AI learning app Gizmo levels up with 13M users and a $22M investment

      April 16, 2026

      Feds will require data centers to show their power bills

      April 16, 2026

      LinkedIn data shows AI isn’t to blame for hiring decline… yet

      April 16, 2026

      Wait, could they still actually break up Live Nation?

      April 16, 2026

      Amazon-backed X-energy files to raise up to $800M in IPO

      April 15, 2026
    • Gear
    • Mobiles
      1. Tech
      2. Gadgets
      3. Insights
      4. View All

      X’s Big Bot Purge Wiped Out a Lot of People’s Secret Porn Feeds

      April 16, 2026

      AI Slop Is Making the Internet Fake-Happy

      April 16, 2026

      'The Last Airbender' Leaked Online. Some Fans Say Paramount Deserves the Fallout

      April 15, 2026

      Allbirds Is Pivoting to AI Compute. Sure, Why Not

      April 15, 2026

      March Update May Have Weakened The Haptics For Pixel 6 Users

      April 2, 2022

      Project 'Diamond' Is The Galaxy S23, Not A Rollable Smartphone

      April 2, 2022

      The At A Glance Widget Is More Useful After March Update

      April 2, 2022

      Pre-Order The OnePlus 10 Pro For Just $1 In The US

      April 2, 2022

      Motorola Edge+ Review: It Checks A Lot Of Boxes

      April 2, 2022

      This Smartphone Concept Design Is Different… In A Good Way

      April 2, 2022

      Twitter Just Made Searching Your Direct Messages Better

      April 2, 2022

      That Netflix Price Hike Is Starting To Take Place

      April 2, 2022

      Latest Huawei Mobiles P50 and P50 Pro Feature Kirin Chips

      January 15, 2021

      Samsung Galaxy M62 Benchmarked with Galaxy Note10’s Chipset

      January 15, 2021
      9.1

      Review: T-Mobile Winning 5G Race Around the World

      January 15, 2021
      8.9

      Samsung Galaxy S21 Ultra Review: the New King of Android Phones

      January 15, 2021
    • Computing
    iGadgets TechiGadgets Tech
    Home»Apps»North Korea’s hijack of one of the web’s most used open source projects was likely weeks in the making
    Apps

    North Korea’s hijack of one of the web’s most used open source projects was likely weeks in the making

    adminBy adminApril 6, 2026No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    North Korean soldiers attend a mass rally to celebrate the North's declaration on November 29 it had achieved full nuclear statehood, on Kim Il-Sung Square in Pyongyang on December 1, 2017. North Korea's leader Kim Jong-Un declared the country had achieved a "historic cause" of becoming a nuclear state, its state media said on November 29, after the country tested an intercontinental ballistic missile earlier in the day.
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A North Korean cyberattack that last Monday briefly hijacked one of the most widely used open source projects on the web took weeks to carry out as part of a long-running campaign to target the code’s top developers.

    The hijacking of the Axios project on March 31 was in part successful because it relied on well-resourced hackers building rapport and trust with their intended target over a long period of time to increase their odds of a successful eventual compromise. This kind of hack highlights the security challenges that developers of popular open source projects can face, at a time when government hackers and cybercriminals alike are targeting widely used projects for their ability to access, in some cases, millions of devices worldwide.

    Jason Saayman, who maintains the popular Axios project that developers use to connect their apps to the internet, provided a post-mortem with a timeline of the hack. He shared that the hackers began their targeting campaign around two weeks before eventually gaining control of his computer to push out malicious code.

    By posing as a real company, creating a realistic-looking Slack workspace, and using fake profiles of its employees to build credibility, Saayman said the suspected North Korean hackers then invited him into a web meeting that prompted him to download malware masquerading as an update necessary to access the call. Saayman said the lure mimicked a technique used by North Korean hackers that tricks would-be victims into granting the hackers remote access to their system, often to steal their cryptocurrency. 

    This attack, Saayman said, mimicked earlier hacks attributed to North Korea by security researchers at Google.

    After compromising and gaining remote access to Saayman’s computer, the hackers then released the malicious updates to the Axios project.

    The two malicious Axios packages, pulled some three hours after they were first published on March 31, may have still infected thousands of systems during that window, though the full breadth of the mass hack is not yet fully clear. Any computer that installed a malicious version of the software during this time may have allowed the hackers to steal their private keys, credentials, and passwords from that computer, which can lead to further breaches.

    Saayman did not immediately respond to an email with questions about the incident.

    North Korean hackers remain one of the most active cyber threats on the internet today, blamed for the theft of at least $2 billion in cryptocurrency in 2025 alone.

    The Kim Jong Un regime remains under international sanctions and banned from the global financial network for violating a ban on its nuclear weapons development program, which the country funds in large part by launching cyberattacks and stealing cryptocurrency.

    North Korea is believed to have thousands of highly organized hackers — the majority of whom are working against their will under the repressive Kim regime. These hackers spend weeks or months carrying out complex social engineering attacks aimed at gaining trust, and eventually access, to steal cryptocurrency and data to extort their victims.

    Security,cyberattack,cybersecurity,North Korea,open source,social engineeringcyberattack,cybersecurity,North Korea,open source,social engineering#North #Koreas #hijack #webs #open #source #projects #weeks #making1775494645

    cyberattack cybersecurity hijack Koreas Making North North Korea Open open source projects social engineering Source webs Weeks
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    admin
    • Website
    • Tumblr

    Related Posts

    AI learning app Gizmo levels up with 13M users and a $22M investment

    April 16, 2026

    Feds will require data centers to show their power bills

    April 16, 2026

    LinkedIn data shows AI isn’t to blame for hiring decline… yet

    April 16, 2026
    Add A Comment

    Leave A Reply Cancel Reply

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    January 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    January 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    January 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By admin
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By admin
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By admin
    Advertisement
    Demo
    iGadgets Tech
    Facebook Twitter Instagram Pinterest Vimeo YouTube
    • Home
    • Tech
    • Gadgets
    • Mobiles
    • Our Authors
    © 2026 ThemeSphere. Designed by WPfastworld.

    Type above and press Enter to search. Press Esc to cancel.