Developer-targeting campaign using malicious Next.js repositories
A coordinated campaign targets developers by distributing malicious Next. js repositories disguised as legitimate projects and technical assessment materials. The attack leverages multiple execution paths including Visual Studio Code workspace automation, build-time execution during development, and server startup execution to run attacker-controlled JavaScript. This leads to staged command-and-control (C2) communication, with a Stage 1 beacon for registration and a Stage 2 controller for persistent tasking. The campaign aims to blend into normal developer workflows, increasing the chance of successful code execution. Compromised assets may include source code, environment secrets, and access credentials to build or cloud infrastructure. The attack involves environment variable exfiltration and dynamic remote code execution, making it highly stealthy and sophisticated. Indicators include several IP addresses linked to C2 infrastructure. No known exploits are currently in the wild, but the threat poses a medium severity risk due to its potential impact on confidentiality and integrity of development environments and sensitive data.
AI Analysis
Technical Summary
This developer-targeting campaign exploits the trust developers place in open-source repositories by distributing malicious Next.js projects and technical assessment materials that appear legitimate. The attack employs three primary execution vectors: automation scripts within Visual Studio Code workspaces, build-time execution triggered during application development, and server startup execution that leverages environment variable exfiltration and dynamic remote code execution. Once executed, the malicious JavaScript retrieves additional payloads at runtime, establishing a multi-stage command-and-control infrastructure. The first stage involves a beacon to register the infected environment with the attacker’s infrastructure, followed by a second stage controller that issues persistent commands, enabling ongoing control and data exfiltration. This approach allows attackers to stealthily integrate into routine developer workflows, increasing the likelihood of successful compromise. The campaign targets critical assets such as source code repositories, environment secrets (e.g., API keys, tokens), and access to build or cloud resources, which could lead to broader organizational breaches. The attack techniques align with MITRE ATT&CK tactics including remote code execution (T1059.007), command and control (T1071), credential access (T1550), and environment variable exfiltration (T1552.001). Indicators of compromise include several IP addresses associated with the C2 infrastructure. Although no active exploits are reported in the wild, the campaign’s sophistication and targeting of developer environments pose a significant risk to organizations relying on Next.js and Node.js ecosystems.
Potential Impact
The campaign can severely impact organizations by compromising the confidentiality, integrity, and availability of critical development assets. Source code theft can lead to intellectual property loss and exposure of proprietary algorithms or business logic. Exfiltration of environment secrets and credentials can enable attackers to pivot into build systems, continuous integration/continuous deployment (CI/CD) pipelines, and cloud infrastructure, potentially leading to widespread compromise. The stealthy nature of the attack, blending into normal developer workflows, increases the risk of prolonged undetected presence, allowing attackers to maintain persistent access and conduct further malicious activities. Organizations may face operational disruptions, reputational damage, regulatory penalties, and financial losses due to intellectual property theft and compromised infrastructure. The targeting of Visual Studio Code and Next.js environments, widely used in modern web development, means that many organizations across industries could be affected, especially those with cloud-native or JavaScript-heavy development practices.
Mitigation Recommendations
1. Enforce strict code review and repository vetting processes to detect and block malicious or suspicious dependencies and repositories before integration. 2. Implement robust supply chain security practices, including the use of trusted package registries and signed packages. 3. Restrict and monitor Visual Studio Code workspace automation scripts and extensions, applying least privilege principles. 4. Use environment variable management solutions that encrypt and control access to secrets, minimizing exposure during build and runtime. 5. Employ runtime application self-protection (RASP) and behavior-based anomaly detection to identify unusual code execution patterns. 6. Monitor network traffic for connections to known malicious IP addresses and domains associated with the campaign’s C2 infrastructure. 7. Educate developers on the risks of using unverified repositories and encourage the use of internal vetted templates and libraries. 8. Integrate security scanning tools into CI/CD pipelines to detect malicious code or suspicious behaviors early in the development lifecycle. 9. Maintain up-to-date threat intelligence feeds to quickly identify and respond to emerging threats targeting development environments. 10. Conduct regular audits of build and deployment environments to detect unauthorized changes or suspicious activities.
Affected Countries
United States, India, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea
Indicators of Compromise
- ip: 147.124.202.208
- ip: 163.245.194.216
- ip: 66.235.168.136
- ip: 87.236.177.9
Developer-targeting campaign using malicious Next.js repositories
Description
A coordinated campaign targets developers by distributing malicious Next. js repositories disguised as legitimate projects and technical assessment materials. The attack leverages multiple execution paths including Visual Studio Code workspace automation, build-time execution during development, and server startup execution to run attacker-controlled JavaScript. This leads to staged command-and-control (C2) communication, with a Stage 1 beacon for registration and a Stage 2 controller for persistent tasking. The campaign aims to blend into normal developer workflows, increasing the chance of successful code execution. Compromised assets may include source code, environment secrets, and access credentials to build or cloud infrastructure. The attack involves environment variable exfiltration and dynamic remote code execution, making it highly stealthy and sophisticated. Indicators include several IP addresses linked to C2 infrastructure. No known exploits are currently in the wild, but the threat poses a medium severity risk due to its potential impact on confidentiality and integrity of development environments and sensitive data.
AI-Powered Analysis
Technical Analysis
This developer-targeting campaign exploits the trust developers place in open-source repositories by distributing malicious Next.js projects and technical assessment materials that appear legitimate. The attack employs three primary execution vectors: automation scripts within Visual Studio Code workspaces, build-time execution triggered during application development, and server startup execution that leverages environment variable exfiltration and dynamic remote code execution. Once executed, the malicious JavaScript retrieves additional payloads at runtime, establishing a multi-stage command-and-control infrastructure. The first stage involves a beacon to register the infected environment with the attacker’s infrastructure, followed by a second stage controller that issues persistent commands, enabling ongoing control and data exfiltration. This approach allows attackers to stealthily integrate into routine developer workflows, increasing the likelihood of successful compromise. The campaign targets critical assets such as source code repositories, environment secrets (e.g., API keys, tokens), and access to build or cloud resources, which could lead to broader organizational breaches. The attack techniques align with MITRE ATT&CK tactics including remote code execution (T1059.007), command and control (T1071), credential access (T1550), and environment variable exfiltration (T1552.001). Indicators of compromise include several IP addresses associated with the C2 infrastructure. Although no active exploits are reported in the wild, the campaign’s sophistication and targeting of developer environments pose a significant risk to organizations relying on Next.js and Node.js ecosystems.
Potential Impact
The campaign can severely impact organizations by compromising the confidentiality, integrity, and availability of critical development assets. Source code theft can lead to intellectual property loss and exposure of proprietary algorithms or business logic. Exfiltration of environment secrets and credentials can enable attackers to pivot into build systems, continuous integration/continuous deployment (CI/CD) pipelines, and cloud infrastructure, potentially leading to widespread compromise. The stealthy nature of the attack, blending into normal developer workflows, increases the risk of prolonged undetected presence, allowing attackers to maintain persistent access and conduct further malicious activities. Organizations may face operational disruptions, reputational damage, regulatory penalties, and financial losses due to intellectual property theft and compromised infrastructure. The targeting of Visual Studio Code and Next.js environments, widely used in modern web development, means that many organizations across industries could be affected, especially those with cloud-native or JavaScript-heavy development practices.
Mitigation Recommendations
1. Enforce strict code review and repository vetting processes to detect and block malicious or suspicious dependencies and repositories before integration. 2. Implement robust supply chain security practices, including the use of trusted package registries and signed packages. 3. Restrict and monitor Visual Studio Code workspace automation scripts and extensions, applying least privilege principles. 4. Use environment variable management solutions that encrypt and control access to secrets, minimizing exposure during build and runtime. 5. Employ runtime application self-protection (RASP) and behavior-based anomaly detection to identify unusual code execution patterns. 6. Monitor network traffic for connections to known malicious IP addresses and domains associated with the campaign’s C2 infrastructure. 7. Educate developers on the risks of using unverified repositories and encourage the use of internal vetted templates and libraries. 8. Integrate security scanning tools into CI/CD pipelines to detect malicious code or suspicious behaviors early in the development lifecycle. 9. Maintain up-to-date threat intelligence feeds to quickly identify and respond to emerging threats targeting development environments. 10. Conduct regular audits of build and deployment environments to detect unauthorized changes or suspicious activities.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.microsoft.com/en-us/security/blog/2026/02/24/c2-developer-targeting-campaign/"]
- Adversary
- null
- Pulse Id
- 699e18510d30e21605243f81
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip147.124.202.208 | — | |
ip163.245.194.216 | — | |
ip66.235.168.136 | — | |
ip87.236.177.9 | — |
Threat ID: 699e1e59b7ef31ef0b4da0b1
Added to database: 2/24/2026, 9:55:37 PM
Last enriched: 2/24/2026, 10:11:25 PM
Last updated: 2/25/2026, 12:45:30 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
North Korean Lazarus Group Now Working With Medusa Ransomware
MediumMoonrise RAT: A New Low-Detection Threat with High-Cost Consequences
MediumFake Zoom meeting 'update' silently installs surveillance software
MediumMalicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer
MediumFour Malicious NuGet Packages Target ASP.NET Developers With JIT Hooking and Credential Exfiltration
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.