Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Anduril has invented a novel drone flying contest where work is the prize

Anthropic and OpenAI CEOs condemn ICE violence, praise Trump

Android smartphones are getting more anti-theft features

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » North Korea-linked hackers target developers through malicious VS Code projects
Identity

North Korea-linked hackers target developers through malicious VS Code projects

userBy userJanuary 20, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

North Korean threat actors associated with the long-running Contagion Interview campaign have been observed using malicious Microsoft Visual Studio Code (VS Code) projects as decoys that provide backdoors to compromised endpoints.

According to Jamf Threat Labs, the latest findings demonstrate the continued evolution of new tactics first discovered in December 2025.

“This activity included the deployment of a backdoor implant that provided remote code execution capabilities on victims’ systems,” security researcher Thijs Xhaflaire said in a report shared with The Hacker News.

The attack, first revealed last month by OpenSourceMalware, essentially involves instructing potential targets to clone a repository on GitHub, GitLab, or Bitbucket and launch a project in VS Code as part of a supposed job evaluation.

The ultimate goal of these efforts is to exploit VS Code task configuration files to execute malicious payloads staged on Vercel domains, depending on the operating system on the infected host. This task is configured to run every time that file or any other file in the project folder is opened in VS Code by setting the “runOn:folderOpen” option. This ultimately leads to the deployment of BeaverTail and InvisibleFerret.

Subsequent iterations of the campaign revealed that the malware was hiding a sophisticated multi-stage dropper within the task configuration file by disguising itself as a benign spell-checking dictionary as a fallback mechanism in case the task was unable to retrieve the payload from the Vercel domain.

cyber security

As before, the obfuscated JavaScript embedded in these files is executed as soon as the victim opens the project in an integrated development environment (IDE). Establish communication with the remote server (‘ip-regions-check.vercel’).[.]app”) and execute the JavaScript code received from it. The final stage provided as part of the attack is another highly obfuscated JavaScript.

Jamf said it discovered yet another change in this campaign. The attackers used a previously undocumented infection method to distribute a backdoor that provided remote code execution capabilities on compromised hosts. The starting point of the attack chain remains the same in that it is activated when a victim uses VS Code to clone and open a malicious Git repository.

“When you open a project, Visual Studio Code asks you to trust the repository creator,” Xhaflaire explained. “Once that trust is granted, the application automatically processes the repository’s tasks.json configuration file, which could result in arbitrary embedded commands being executed on the system.”

“On macOS systems, this runs a background shell command that uses nohup bash -c in conjunction with curl -s to remotely retrieve the JavaScript payload and pipe it directly to the Node.js runtime. This allows execution to continue independently, suppressing all command output, even when the Visual Studio Code process terminates.”

The Vercel-hosted JavaScript payload contains the main backdoor logic to gather basic host information and communicate with the remote server to establish a persistent execution loop that facilitates remote code execution, system fingerprinting, and ongoing communication.

In one case, the Apple device management company said it observed more JavaScript instructions being executed about eight minutes after the initial infection. The newly downloaded JavaScript is designed to send a beacon to the server every 5 seconds, execute additional JavaScript, and erase traces of activity upon receiving a signal from the operator. It is suspected that the script may have been generated using artificial intelligence (AI) tools due to the presence of inline comments and phrases in the source code.

Threat actors associated with the Democratic People’s Republic of Korea (DPRK) are known to specifically target software engineers, particularly those working in the cryptocurrency, blockchain, and fintech fields. This is because software engineers often have privileged access to financial assets, digital wallets, and technological infrastructure.

Compromising an account or system can allow an attacker to gain unauthorized access to source code, intellectual property, internal systems, and siphon digital assets. These consistent changes to their tactics are seen as an effort to achieve greater success in cyber espionage and financial goals in support of heavily sanctioned regimes.

The development comes as Red Asgard details an investigation into a malicious repository called Tsunami (also known as TsunamiKit) that was found to be using VS Code task configurations to obtain obfuscated JavaScript designed to drop a full-featured backdoor and XMRig cryptocurrency miner.

cyber security

Separate analysis released last week by the Security Alliance revealed the campaign’s abuse of VS Code tasks in attacks that approached unspecified victims on LinkedIn. The attacker claimed to be the chief technology officer of a project called Meta2140 and shared the concept.[.]Therefore, the link includes a technical assessment and a URL to the Bitbucket repository hosting the malicious code.

Interestingly, this attack chain is designed to fallback to two other methods. It installs a malicious npm dependency named ‘grayavatar’ or runs JavaScript code that obtains an advanced Node.js controller. This controller runs five different modules to record keystrokes, take screenshots, scan the system’s home directory for sensitive files, replace wallet addresses copied to the clipboard, credentials from the web browser, and establish a persistent connection to a remote server.

The malware then begins setting up a parallel Python environment with a stager script that enables data collection, cryptocurrency mining using XMRig, keylogging, and deployment of AnyDesk for remote access. Notice that the Node.js and Python layers are called BeaverTail and InvisibleFerret, respectively.

These findings indicate that state-sponsored attackers are experimenting with multiple delivery methods in parallel to increase the likelihood of a successful attack.

“This activity highlights the continued evolution of threat actors associated with North Korea, who are consistently adapting their tools and delivery mechanisms to integrate with legitimate developer workflows,” Jamf said. “The exploitation of Visual Studio Code task configuration files and Node.js execution shows that these technologies continue to evolve along with commonly used development tools.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleICE becomes one of the most blocked accounts on Bluesky after verification
Next Article TwinH: The AI Extension That Knows Your Taste Better Than You Do
user
  • Website

Related Posts

WhatsApp deploys lockdown-style security mode to protect targeted users from spyware

January 27, 2026

Experts detect Pakistan-linked cyber attack targeting Indian government agencies

January 27, 2026

ClickFix attack spreads using fake CAPTCHAs, Microsoft Scripts, and trusted web services

January 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Anduril has invented a novel drone flying contest where work is the prize

Anthropic and OpenAI CEOs condemn ICE violence, praise Trump

Android smartphones are getting more anti-theft features

Indian states consider Australian-style ban on social media for children

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.