“This was not opportunistic. It was precision.” — How North Korean hackers used Microsoft Teams and Slack to compromise Windows PCs with an elaborate ploy

In a recent incident that has raised concerns across the tech community, axios, a widely used JavaScript HTTP client library, experienced a temporary compromise attributed to suspected North Korean hackers. The breach, which occurred on March 30, 2026, involved the hijacking of maintainer Jason Saayman’s primary account, enabling the attackers to publish two malicious versions of axios to npm, a prominent public registry for software tools. Fortunately, the malicious versions were swiftly identified by StepSecurity, and Saayman managed to remove them within approximately three hours of their release.

In the aftermath, a post-mortem blog entry was shared on GitHub, outlining essential measures users of Windows, macOS, and Linux can take to safeguard their systems. The report highlights the potential risks associated with the Remote Access Trojan (RAT) that was introduced, capable of pilfering sensitive credentials from affected machines.

How do Microsoft Teams and Slack fit into the axios hack’s timeline?

TechCrunch has shed light on the involvement of North Korean hackers, specifically attributing the attack to a group known as UNC1069, which has been engaged in similar activities since at least 2018. Their expertise in supply chain attacks has historically been leveraged to steal cryptocurrency, and the full implications of this incident remain to be seen.

The narrative takes a more intricate turn when examining the timeline leading up to the attack. Saayman revealed that approximately two weeks prior to the breach, a social engineering campaign was initiated against him. The attackers posed as the founder of a legitimate company, having meticulously cloned both the founder’s identity and the company’s branding.

As the scheme unfolded, Saayman was invited to a Slack workspace that appeared authentic, complete with branded materials, fabricated LinkedIn posts, and convincing team profiles. Following this, a meeting was scheduled on Microsoft Teams, where a fake “missing update” prompted Saayman to install a small file. This seemingly innocuous action resulted in the RAT being downloaded onto his computer. It’s important to note that Microsoft Teams itself was not compromised; rather, it served as a facade for delivering the Trojan.

Saayman remarked on the sophistication of the operation, stating, “Everything was extremely well coordinated, looked legit, and was done in a professional manner.” The incident serves as a stark reminder of the lengths to which cybercriminals will go, and it underscores the importance of vigilance in the face of such elaborate schemes.

As axios continues its investigation into the breach, the focus remains on implementing robust measures to prevent future occurrences and protect users from similar threats.

Winsage
"This was not opportunistic. It was precision." — How North Korean hackers used Microsoft Teams and Slack to compromise Windows PCs with an elaborate ploy