North Korean hackers target Microsoft Virtual Studio Code
Date:
Wed, 21 Jan 2026 15:10:00 +0000
Description:
Contagious Interview keeps evolving, as Lazarus hacker now abuse Microsoft Visual Studio Code, too.
FULL STORY ======================================================================Lazarus groups Contagious Interview campaign abuses Visual Studio Code via malicious Git repositories Attackers deliver JavaScript payloads on macOS, enabling persistent data harvesting and C2 communication Jamf urges enabling advanced threat controls and caution with untrusted repositories
As part of the infamous Contagious Interview campaign, North Korean threat actors were seen abusing legitimate Microsoft Visual Studio Code in their attacks.
Contagious Interview is a hacking campaign in which the Lazarus group (and other state-sponsored North Korean actors) create fake jobs and invite software and blockchain developers in Western countries for interviews.
During the interview process, they trick the victims into deploying malware
on their devices, granting the attackers unabated access to their computers, as well as their current employers networks. How to stay safe
The campaign is quite successful, too, as it is blamed for some of the
biggest crypto heists in recent years.
In a new report, security researchers from Jamf detailed an evolution in the techniques used during earlier stages of the campaign. They said the
attackers would first create a malicious Git repository, and host it on platforms such as GitHub, or GitLab.
After that, during the "interview" process, they would trick the victim into cloning and opening the repository using Microsoft Visual Studio Code. The tool would prompt the victim to trust the repository author and if that happens, the app automatically processes the tasks.json configuration file that triggers embedded arbitrary commands.
On macOS, these commands use a background shell to remotely retrieve a JavaScript payload (often from a platform like Vercel) and pipe it into the Node.js runtime.
The JavaScript payload then executes, establishing a persistent loop that harvests host information (hostname, MAC addresses, and OS details) and communicates with a remote command-and-control (C2) server. Finally, the backdoor periodically pings the C2 server, sending system data and receiving further malicious JavaScript instructions.
We strongly recommend that customers ensure Threat Prevention and Advanced Threat Controls are enabled and set to block mode in Jamf for Mac to remain protected against the techniques described in this research, Jamf warned.
Developers should remain cautious when interacting with third-party repositories, especially those shared directly or originating from unfamiliar sources. Before marking a repository as trusted in Visual Studio Code, its important to review its contents, they added.
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the
Follow button!
And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.
======================================================================
Link to news story:
https://www.techradar.com/pro/security/north-korean-hackers-target-microsoft-v irtual-studio-code
--- Mystic BBS v1.12 A49 (Linux/64)
* Origin: tqwNet Technology News (1337:1/100)