Developer-targeting campaign using malicious Next.js repositories
A coordinated campaign is targeting developers through malicious repositories disguised as legitimate Next.js projects and technical assessment materials. The attack uses multiple entry points that lead to runtime retrieval and local execution of attacker-controlled JavaScript, transitioning into staged command-and-control. The campaign employs three main execution paths: Visual Studio Code workspace automation, build-time execution during application development, and server startup execution via environment variable exfiltration and dynamic remote code execution. The attack chain includes a Stage 1 C2 beacon for registration and a Stage 2 C2 controller for persistent tasking. This sophisticated approach allows attackers to blend into routine developer workflows, increasing the likelihood of code execution and potentially compromising high-value assets such as source code, environment secrets, and access to build or cloud resources.
AI Analysis
Technical Summary
This developer-targeting campaign exploits the trust developers place in open-source repositories by distributing malicious Next.js projects and technical assessment materials that appear legitimate. The attack employs three primary execution vectors: automation scripts within Visual Studio Code workspaces, build-time execution triggered during application development, and server startup execution that leverages environment variable exfiltration and dynamic remote code execution. Once executed, the malicious JavaScript retrieves additional payloads at runtime, establishing a multi-stage command-and-control infrastructure. The first stage involves a beacon to register the infected environment with the attacker’s infrastructure, followed by a second stage controller that issues persistent commands, enabling ongoing control and data exfiltration. This approach allows attackers to stealthily integrate into routine developer workflows, increasing the likelihood of successful compromise. The campaign targets critical assets such as source code repositories, environment secrets (e.g., API keys, tokens), and access to build or cloud resources, which could lead to broader organizational breaches. The attack techniques align with MITRE ATT&CK tactics including remote code execution (T1059.007), command and control (T1071), credential access (T1550), and environment variable exfiltration (T1552.001). Indicators of compromise include several IP addresses associated with the C2 infrastructure. Although no active exploits are reported in the wild, the campaign’s sophistication and targeting of developer environments pose a significant risk to organizations relying on Next.js and Node.js ecosystems.
Potential Impact
The campaign can severely impact organizations by compromising the confidentiality, integrity, and availability of critical development assets. Source code theft can lead to intellectual property loss and exposure of proprietary algorithms or business logic. Exfiltration of environment secrets and credentials can enable attackers to pivot into build systems, continuous integration/continuous deployment (CI/CD) pipelines, and cloud infrastructure, potentially leading to widespread compromise. The stealthy nature of the attack, blending into normal developer workflows, increases the risk of prolonged undetected presence, allowing attackers to maintain persistent access and conduct further malicious activities. Organizations may face operational disruptions, reputational damage, regulatory penalties, and financial losses due to intellectual property theft and compromised infrastructure. The targeting of Visual Studio Code and Next.js environments, widely used in modern web development, means that many organizations across industries could be affected, especially those with cloud-native or JavaScript-heavy development practices.
Mitigation Recommendations
1. Enforce strict code review and repository vetting processes to detect and block malicious or suspicious dependencies and repositories before integration. 2. Implement robust supply chain security practices, including the use of trusted package registries and signed packages. 3. Restrict and monitor Visual Studio Code workspace automation scripts and extensions, applying least privilege principles. 4. Use environment variable management solutions that encrypt and control access to secrets, minimizing exposure during build and runtime. 5. Employ runtime application self-protection (RASP) and behavior-based anomaly detection to identify unusual code execution patterns. 6. Monitor network traffic for connections to known malicious IP addresses and domains associated with the campaign’s C2 infrastructure. 7. Educate developers on the risks of using unverified repositories and encourage the use of internal vetted templates and libraries. 8. Integrate security scanning tools into CI/CD pipelines to detect malicious code or suspicious behaviors early in the development lifecycle. 9. Maintain up-to-date threat intelligence feeds to quickly identify and respond to emerging threats targeting development environments. 10. Conduct regular audits of build and deployment environments to detect unauthorized changes or suspicious activities.
Affected Countries
United States, India, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea
Indicators of Compromise
- ip: 147.124.202.208
- ip: 163.245.194.216
- ip: 66.235.168.136
- ip: 87.236.177.9
Developer-targeting campaign using malicious Next.js repositories
Description
A coordinated campaign is targeting developers through malicious repositories disguised as legitimate Next.js projects and technical assessment materials. The attack uses multiple entry points that lead to runtime retrieval and local execution of attacker-controlled JavaScript, transitioning into staged command-and-control. The campaign employs three main execution paths: Visual Studio Code workspace automation, build-time execution during application development, and server startup execution via environment variable exfiltration and dynamic remote code execution. The attack chain includes a Stage 1 C2 beacon for registration and a Stage 2 C2 controller for persistent tasking. This sophisticated approach allows attackers to blend into routine developer workflows, increasing the likelihood of code execution and potentially compromising high-value assets such as source code, environment secrets, and access to build or cloud resources.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This developer-targeting campaign exploits the trust developers place in open-source repositories by distributing malicious Next.js projects and technical assessment materials that appear legitimate. The attack employs three primary execution vectors: automation scripts within Visual Studio Code workspaces, build-time execution triggered during application development, and server startup execution that leverages environment variable exfiltration and dynamic remote code execution. Once executed, the malicious JavaScript retrieves additional payloads at runtime, establishing a multi-stage command-and-control infrastructure. The first stage involves a beacon to register the infected environment with the attacker’s infrastructure, followed by a second stage controller that issues persistent commands, enabling ongoing control and data exfiltration. This approach allows attackers to stealthily integrate into routine developer workflows, increasing the likelihood of successful compromise. The campaign targets critical assets such as source code repositories, environment secrets (e.g., API keys, tokens), and access to build or cloud resources, which could lead to broader organizational breaches. The attack techniques align with MITRE ATT&CK tactics including remote code execution (T1059.007), command and control (T1071), credential access (T1550), and environment variable exfiltration (T1552.001). Indicators of compromise include several IP addresses associated with the C2 infrastructure. Although no active exploits are reported in the wild, the campaign’s sophistication and targeting of developer environments pose a significant risk to organizations relying on Next.js and Node.js ecosystems.
Potential Impact
The campaign can severely impact organizations by compromising the confidentiality, integrity, and availability of critical development assets. Source code theft can lead to intellectual property loss and exposure of proprietary algorithms or business logic. Exfiltration of environment secrets and credentials can enable attackers to pivot into build systems, continuous integration/continuous deployment (CI/CD) pipelines, and cloud infrastructure, potentially leading to widespread compromise. The stealthy nature of the attack, blending into normal developer workflows, increases the risk of prolonged undetected presence, allowing attackers to maintain persistent access and conduct further malicious activities. Organizations may face operational disruptions, reputational damage, regulatory penalties, and financial losses due to intellectual property theft and compromised infrastructure. The targeting of Visual Studio Code and Next.js environments, widely used in modern web development, means that many organizations across industries could be affected, especially those with cloud-native or JavaScript-heavy development practices.
Mitigation Recommendations
1. Enforce strict code review and repository vetting processes to detect and block malicious or suspicious dependencies and repositories before integration. 2. Implement robust supply chain security practices, including the use of trusted package registries and signed packages. 3. Restrict and monitor Visual Studio Code workspace automation scripts and extensions, applying least privilege principles. 4. Use environment variable management solutions that encrypt and control access to secrets, minimizing exposure during build and runtime. 5. Employ runtime application self-protection (RASP) and behavior-based anomaly detection to identify unusual code execution patterns. 6. Monitor network traffic for connections to known malicious IP addresses and domains associated with the campaign’s C2 infrastructure. 7. Educate developers on the risks of using unverified repositories and encourage the use of internal vetted templates and libraries. 8. Integrate security scanning tools into CI/CD pipelines to detect malicious code or suspicious behaviors early in the development lifecycle. 9. Maintain up-to-date threat intelligence feeds to quickly identify and respond to emerging threats targeting development environments. 10. Conduct regular audits of build and deployment environments to detect unauthorized changes or suspicious activities.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.microsoft.com/en-us/security/blog/2026/02/24/c2-developer-targeting-campaign/"]
- Adversary
- null
- Pulse Id
- 699e18510d30e21605243f81
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip147.124.202.208 | — | |
ip163.245.194.216 | — | |
ip66.235.168.136 | — | |
ip87.236.177.9 | — |
Threat ID: 699e1e59b7ef31ef0b4da0b1
Added to database: 2/24/2026, 9:55:37 PM
Last enriched: 2/24/2026, 10:11:25 PM
Last updated: 4/10/2026, 6:18:00 AM
Views: 240
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.