Why North Korean Hackers Are Targeting Devs Through Visual Studio Code Projects
There’s a new backdoor campaign going around. It’s slick, it’s persistent, and it’s targeting developers — specifically those using Microsoft Visual Studio Code (VS Code) as part of their day-to-day workflow.
This one’s coming out of North Korea. And it's not just some throwaway malware — it's part of a broader shift in how state-linked actors are slipping past traditional defences by piggybacking off developer tools and trusted platforms.
The Basics: Dev Tools as Attack Vectors
Security researchers at Jamf Threat Labs have uncovered the latest iteration of an ongoing campaign (nicknamed Contagious Interview) that’s weaponising VS Code projects.
The method? Attackers instruct targets — usually software engineers — to clone a GitHub, GitLab, or Bitbucket repository and open it in VS Code. They pose as recruiters or hiring managers offering a technical assessment.
Once the repo is opened, a malicious tasks.json file is silently executed in the background — taking advantage of a legit VS Code feature that lets projects run commands when opened.
No phishing link. No sketchy email attachment. Just a developer doing their job and opening a project.
How It Works: Quiet, Cross-Platform, Persistent
Let’s get specific.
- When the project is opened, VS Code prompts the user to “trust” the project. If the user says yes, VS Code automatically processes the
tasks.jsonfile. - That file includes commands set to run on folder open, which triggers a remote payload — typically obfuscated JavaScript hosted on Vercel.
- On macOS, that script gets pulled down using
curland piped straight into Node.js using anohupbash command — so it keeps running even if VS Code is closed. - The result? A full backdoor that allows remote code execution, system reconnaissance, persistent communications, and ultimately, control.
The payloads are referred to as BeaverTail (Node.js layer) and InvisibleFerret (Python layer). These aren’t hobbyist tools — they’re modular, evasive, and built for flexibility.
What They’re After and Why Developers
This isn’t random. North Korean state-backed actors (DPRK-linked groups) are going after developers in high-value sectors: crypto, blockchain, fintech. They know what’s at stake.
Why target devs?
- Developers often have direct access to source code, infrastructure, or wallet environments.
- A compromised dev workstation is a great pivot point — it gives attackers visibility into internal systems, credentials, and in some cases, keys to the kingdom.
- The engineering workflow is relatively under-defended. It’s easier to smuggle malware through a trusted Git repo than to trick a SOC-monitored email gateway.
In short, devs are an increasingly valuable — and vulnerable — attack surface.
Fallbacks, Obfuscation, and AI-Generated Malware
The attackers aren’t relying on just one method either. If the initial payload doesn’t download correctly, the task file falls back to spell check dictionaries that are actually droppers.
In more advanced cases, the malware uses multi-stage delivery:
- Initial backdoor using Node.js
- Secondary payloads for keylogging, clipboard hijacking, and browser credential theft
- Python-based modules for persistence and crypto mining via XMRig
- Remote access tools like AnyDesk
Some of the JavaScript even shows signs of being generated by AI tooling — likely to help speed up development, avoid detection, or randomise behaviour.
Social Engineering Still Works — Just in New Ways
Notably, in at least one case, the attackers approached a developer on LinkedIn pretending to be a CTO for a blockchain startup. They shared a link to a Bitbucket repo hosted in a Notion document — again, all looking clean and professional.
This isn’t spearphishing in the traditional sense — it’s spearcloning. Clean repo. Real-looking code. Familiar developer tools. The attack happens inside the IDE.
It’s clever. And it’s dangerous.
What Aussie Tech Leaders Should Actually Care About
This isn’t just a developer problem. It’s a supply chain issue and a workforce security blind spot. If your teams include engineers, devops, or contractors who use Git-based workflows and VS Code this affects you.
Key takeaways:
- Trust Prompts Aren’t Security Controls
Most devs click "Trust" in VS Code by default. They’re conditioned to. Don’t assume they’re scrutinising every project they open. - VS Code Is a Legitimate Execution Vector
This isn’t an exploit it’s a feature being abused. That makes detection harder and response slower. - Your Dev Environments Are Now a Target
That nice clean MacBook Pro your blockchain engineer uses? It’s probably more exposed than your Windows fleet and more valuable if popped. - Recruitment-Based Attacks Are on the Rise
Threat actors are mimicking hiring processes. That “technical assessment” could be malware. Your HR and security teams should be aware of this vector. - Detection Will Lag
Standard EDR and AV won’t flag a trusted IDE executing a repo’s config file especially when the payload is hosted on a legit domain like Vercel.
What to Do About It
Let’s keep it practical:
- Educate your dev teams
Make sure developers know that opening random GitHub projects in VS Code isn’t risk-free. Bake security awareness into onboarding not just for corporate systems, but for coding practices. - Review Git-based workflows
If you're running private Git servers or using public repos for assessments, revisit your hygiene. Disable auto-execution of tasks where possible. - Instrument your environments
Can you monitor unexpected Node.js or Python activity on developer machines? Probably not today but you should. - Threat model for dev tools
Stop assuming the IDE is sacred. It’s just another process that can be hijacked. Include it in your attack simulations and red teaming.
Final Word
North Korean actors aren’t just after government secrets or nuclear IP anymore. They're targeting software engineers with access to money, code, and infrastructure. And they’re doing it through platforms we trust every day GitHub, VS Code, LinkedIn.
If you’re in cybersecurity, IT leadership, or managing dev teams this isn’t a story to file away under “interesting.” This is a story that belongs in your next team briefing.
Because if you’re still treating developer tools as safe by default, you’re already behind.
Want more breakdowns like this, minus the spin?
Follow TheCyberGuyAU on LinkedIn or subscribe to the blog for grounded takes that help you stay ahead of real threats not vendor headlines.






Comments
Post a Comment