BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /CISA Adds Google Dawn CVE to KEV as North Korean APT UNC1069 Claims Axios Supply Chain Attack

CISA Adds Google Dawn CVE to KEV as North Korean APT UNC1069 Claims Axios Supply Chain Attack

criticalNation-State & APT|April 2, 20263 min read

Originally reported by Security Affairs, The Record

#cisa-kev#google-dawn#north-korea#supply-chain#ransomware#crypto-heist#critical-infrastructure
Share

TL;DR

CISA confirmed active exploitation of a use-after-free vulnerability in Google Dawn by adding it to the KEV catalog. Meanwhile, Google attributed the recent Axios npm supply chain compromise to North Korean threat group UNC1069, while ransomware operators continue targeting critical infrastructure including water treatment facilities.

Why critical?

CISA's addition of CVE-2026-5281 to the KEV catalog confirms active exploitation of a critical vulnerability in Google Dawn. Combined with confirmed North Korean APT activity targeting the npm supply chain, this represents immediate threats to enterprise infrastructure.

CISA Adds Google Dawn Vulnerability to KEV Catalog

CISA added CVE-2026-5281, a use-after-free vulnerability in Google Dawn with a CVSS score of 8.8, to its Known Exploited Vulnerabilities catalog. The addition signals confirmed active exploitation of the flaw in the wild.

Google Dawn serves as the WebGPU implementation for Chromium-based browsers and native applications. The use-after-free condition could allow attackers to execute arbitrary code, making it a high-value target for threat actors seeking to compromise systems running Dawn-enabled applications.

Federal agencies must remediate the vulnerability by the CISA-mandated deadline, while private sector organizations should prioritize patching given the confirmed active exploitation status.

North Korean APT UNC1069 Behind Axios Supply Chain Attack

Google attributed the recent compromise of the popular Axios npm package to UNC1069, a North Korean threat group focused on financial gain. The supply chain attack targeted developers and organizations relying on the widely-used HTTP client library.

John Hultquist from Google's threat intelligence team confirmed the attribution, marking another instance of North Korean actors leveraging supply chain vectors for monetary objectives. The compromise of Axios, with millions of weekly downloads, demonstrates the significant reach these attacks can achieve.

Organizations using Axios should verify package integrity and review dependency management processes to detect potential compromise indicators.

Crypto Platform Drift Suffers Massive Heist

Decentralized finance platform Drift suspended operations following a security incident that security experts believe resulted in hundreds of millions of dollars in stolen cryptocurrency. The Solana-based platform confirmed the cyberattack on Wednesday.

The incident highlights persistent vulnerabilities in DeFi protocols, where smart contract flaws and operational security gaps continue to provide lucrative targets for cybercriminals. The scale of the alleged theft ranks among the largest cryptocurrency heists recorded.

Drift has not disclosed technical details of the compromise or provided a timeline for service restoration.

Nissan Confirms Third-Party Vendor Breach

Nissan acknowledged that stolen data originated from a third-party vendor after a hacking group claimed to have breached file-transfer systems serving Nissan and Infiniti dealerships across North America. The automaker stated no indication exists that customer information was accessed or compromised.

The incident underscores supply chain risks where third-party vendors become attack vectors for reaching primary targets. While Nissan maintains customer data remains secure, the breach demonstrates how threat actors continue exploiting vendor relationships to access corporate networks.

The identity of the claiming hacking group and the scope of accessed data remain undisclosed.

North Dakota Water Plant Hit by Ransomware

The city of Minot, North Dakota reported a March ransomware attack against its water treatment facility. City officials emphasized that operations continue normally despite the security incident.

The attack represents another instance of ransomware operators targeting critical infrastructure, specifically water and wastewater systems that CISA has identified as priority protection sectors. While operational continuity was maintained, the incident demonstrates persistent threats to essential services.

No details were provided regarding the ransomware variant involved or whether ransom demands were made.

Sources

  • U.S. CISA adds a flaw in Google Dawn to its Known Exploited Vulnerabilities catalog
  • Google links Axios npm supply chain attack to North Korea-linked APT UNC1069
  • Crypto platform Drift suspends services after millions stolen in security incident
  • Nissan says stolen data came from third-party vendor after hacking group claims breach
  • North Dakota water treatment plant reports March ransomware attack

Originally reported by Security Affairs, The Record

Tags

#cisa-kev#google-dawn#north-korea#supply-chain#ransomware#crypto-heist#critical-infrastructure

Tracked Companies

🇺🇸Google

Related Intelligence

  • Critical Infrastructure Under Fire: Romanian Attacks, Citrix Zero-Day, and Ransomware Evolution

    criticalApr 1, 2026
  • CISA Adds Chrome Exploits to KEV, SocksEscort Botnet Disrupted, Ransomware Responder Charged

    criticalMar 14, 2026
  • Nation-State Roundup: CISA KEV Updates, North Korean IT Infiltration, and Russian Hybrid Warfare Escalation

    criticalFeb 21, 2026

Related Knowledge

  • Threat Intelligence Deep Training

    reference
  • MITRE ATT&CK / D3FEND Deep Reference

    reference
  • NERF Training: Emerging Threats Deep Dive (2025-2026)

    reference

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Cloudflare Unveils EmDash: WordPress Alternative Targeting Plugin Security