Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Threat Actors Expand Abuse of Microsoft Visual Studio Code

0
Medium
Published: Wed Jan 21 2026 (01/21/2026, 12:38:22 UTC)
Source: AlienVault OTX General

Description

North Korean threat actors have evolved their techniques in the Contagious Interview campaign, now abusing Microsoft Visual Studio Code task configuration files. The infection chain begins when a victim opens a malicious Git repository, often disguised as part of a recruitment process. If trust is granted, arbitrary commands are executed on the system. The malware uses JavaScript payloads hosted on vercel.app to implement backdoor logic, including remote code execution, system fingerprinting, and persistent command-and-control communication. The backdoor collects host information and beacons to a C2 server every five seconds. Recent observations show further execution of similar payloads, indicating ongoing development of these tactics.

AI-Powered Analysis

AILast updated: 01/21/2026, 23:35:43 UTC

Technical Analysis

This threat involves North Korean state-sponsored actors evolving their Contagious Interview campaign by abusing Microsoft Visual Studio Code's task configuration files to execute malicious commands. The infection chain starts when a victim, typically targeted through a fake recruitment process, clones or opens a malicious Git repository containing specially crafted VS Code task files. When the victim grants trust to these tasks, arbitrary commands embedded in the task configuration are executed on the local system. The attackers use JavaScript payloads hosted on the vercel.app platform to implement a backdoor with capabilities including remote code execution, system fingerprinting, and persistent command-and-control communication. The backdoor collects detailed host information and sends beacon signals to a C2 server every five seconds, ensuring continuous control and data exfiltration. The campaign primarily targets macOS systems and abuses popular developer platforms such as GitHub and GitLab to lure victims. The malware leverages Node.js and JavaScript execution techniques (T1059.007, T1059.005) and employs obfuscation (T1027) and persistence mechanisms (T1105). Indicators include multiple file hashes, an IP address (87.236.177.9), and a domain (srv37746.hosted-by-eurohoster.org). Although no CVE or known exploits in the wild are reported, the sophistication and persistence of the campaign indicate a medium-level threat with potential for escalation.

Potential Impact

For European organizations, especially those involved in software development, recruitment, and technology sectors, this threat poses significant risks. The abuse of VS Code task files can lead to unauthorized remote code execution, allowing attackers to gain persistent access to sensitive systems. This compromises confidentiality by enabling data theft, including intellectual property and personal information. Integrity is at risk as attackers can modify or inject malicious code into development environments. Availability could be affected if attackers deploy destructive payloads or disrupt operations. The use of legitimate developer tools and platforms like GitHub and GitLab increases the likelihood of successful social engineering attacks, particularly in organizations with remote or hybrid workforces. The persistent C2 communication every five seconds facilitates ongoing espionage and lateral movement within networks. European organizations with macOS endpoints and those relying heavily on VS Code are particularly vulnerable. The campaign's disguise as recruitment processes may also target HR departments, increasing the attack surface.

Mitigation Recommendations

1. Enforce strict policies on trusting VS Code workspace and task configuration files, especially from unknown or unverified Git repositories. 2. Educate employees, particularly in HR and development teams, about the risks of interacting with unsolicited recruitment-related repositories. 3. Implement endpoint detection and response (EDR) solutions capable of monitoring and alerting on suspicious VS Code task executions and Node.js script activities. 4. Monitor network traffic for frequent beaconing patterns, especially connections to suspicious domains like vercel.app or IPs such as 87.236.177.9, and block or investigate anomalous C2 communications. 5. Use application allowlisting to restrict execution of unauthorized scripts and binaries. 6. Regularly audit and restrict permissions on developer tools and repositories to minimize exposure. 7. Integrate threat intelligence feeds to detect known indicators of compromise (IOCs) such as the provided hashes and domains. 8. Encourage multi-factor authentication and least privilege principles for access to development and recruitment platforms. 9. Maintain up-to-date backups and incident response plans tailored to supply chain and developer toolchain attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.jamf.com/blog/threat-actors-expand-abuse-of-visual-studio-code"]
Adversary
North Korea (DPRK)
Pulse Id
6970c8be406455823a3d9652
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash1b26f73fa88f8c3b17adf6db12ec674481db1f92eb04806815b8fbd6086f07ef
hash67c05c1624a227959728e960e4563435db2519a24a46e95207a42ea8d4307e2d
hash71d8a974548e4e152e2c818d1febb7862632c1f9bff6adaa731bbaf6b23bd4b9
hash71e4ea17c871b983a2cbbea7a4fbd7fe498951c8fe4a1e17377e9aa06fd7184a
hash932a67816b10a34d05a2621836cdf7fbf0628bbfdf66ae605c5f23455de1e0bc
hasha2194390105731ce33cb9a51011c42a39a440942e907099f072916a36f17ef4b
hashf8ae6ae9d6a13a8dddb05975930161601b5cfdd0cec30b7efdc5ba0606774998

Ip

ValueDescriptionCopy
ip87.236.177.9

Domain

ValueDescriptionCopy
domainsrv37746.hosted-by-eurohoster.org

Threat ID: 69715f574623b1157cf35e46

Added to database: 1/21/2026, 11:20:55 PM

Last enriched: 1/21/2026, 11:35:43 PM

Last updated: 1/24/2026, 2:12:46 PM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats