Threat Actors Expand Abuse of Microsoft Visual Studio Code
North Korean threat actors have evolved their techniques in the Contagious Interview campaign, now abusing Microsoft Visual Studio Code task configuration files. The infection chain begins when a victim opens a malicious Git repository, often disguised as part of a recruitment process. If trust is granted, arbitrary commands are executed on the system. The malware uses JavaScript payloads hosted on vercel.app to implement backdoor logic, including remote code execution, system fingerprinting, and persistent command-and-control communication. The backdoor collects host information and beacons to a C2 server every five seconds. Recent observations show further execution of similar payloads, indicating ongoing development of these tactics.
AI Analysis
Technical Summary
This threat involves North Korean state-sponsored actors evolving their Contagious Interview campaign by abusing Microsoft Visual Studio Code's task configuration files to execute malicious commands. The infection chain starts when a victim, typically targeted through a fake recruitment process, clones or opens a malicious Git repository containing specially crafted VS Code task files. When the victim grants trust to these tasks, arbitrary commands embedded in the task configuration are executed on the local system. The attackers use JavaScript payloads hosted on the vercel.app platform to implement a backdoor with capabilities including remote code execution, system fingerprinting, and persistent command-and-control communication. The backdoor collects detailed host information and sends beacon signals to a C2 server every five seconds, ensuring continuous control and data exfiltration. The campaign primarily targets macOS systems and abuses popular developer platforms such as GitHub and GitLab to lure victims. The malware leverages Node.js and JavaScript execution techniques (T1059.007, T1059.005) and employs obfuscation (T1027) and persistence mechanisms (T1105). Indicators include multiple file hashes, an IP address (87.236.177.9), and a domain (srv37746.hosted-by-eurohoster.org). Although no CVE or known exploits in the wild are reported, the sophistication and persistence of the campaign indicate a medium-level threat with potential for escalation.
Potential Impact
For European organizations, especially those involved in software development, recruitment, and technology sectors, this threat poses significant risks. The abuse of VS Code task files can lead to unauthorized remote code execution, allowing attackers to gain persistent access to sensitive systems. This compromises confidentiality by enabling data theft, including intellectual property and personal information. Integrity is at risk as attackers can modify or inject malicious code into development environments. Availability could be affected if attackers deploy destructive payloads or disrupt operations. The use of legitimate developer tools and platforms like GitHub and GitLab increases the likelihood of successful social engineering attacks, particularly in organizations with remote or hybrid workforces. The persistent C2 communication every five seconds facilitates ongoing espionage and lateral movement within networks. European organizations with macOS endpoints and those relying heavily on VS Code are particularly vulnerable. The campaign's disguise as recruitment processes may also target HR departments, increasing the attack surface.
Mitigation Recommendations
1. Enforce strict policies on trusting VS Code workspace and task configuration files, especially from unknown or unverified Git repositories. 2. Educate employees, particularly in HR and development teams, about the risks of interacting with unsolicited recruitment-related repositories. 3. Implement endpoint detection and response (EDR) solutions capable of monitoring and alerting on suspicious VS Code task executions and Node.js script activities. 4. Monitor network traffic for frequent beaconing patterns, especially connections to suspicious domains like vercel.app or IPs such as 87.236.177.9, and block or investigate anomalous C2 communications. 5. Use application allowlisting to restrict execution of unauthorized scripts and binaries. 6. Regularly audit and restrict permissions on developer tools and repositories to minimize exposure. 7. Integrate threat intelligence feeds to detect known indicators of compromise (IOCs) such as the provided hashes and domains. 8. Encourage multi-factor authentication and least privilege principles for access to development and recruitment platforms. 9. Maintain up-to-date backups and incident response plans tailored to supply chain and developer toolchain attacks.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Ireland
Indicators of Compromise
- hash: 1b26f73fa88f8c3b17adf6db12ec674481db1f92eb04806815b8fbd6086f07ef
- hash: 67c05c1624a227959728e960e4563435db2519a24a46e95207a42ea8d4307e2d
- hash: 71d8a974548e4e152e2c818d1febb7862632c1f9bff6adaa731bbaf6b23bd4b9
- hash: 71e4ea17c871b983a2cbbea7a4fbd7fe498951c8fe4a1e17377e9aa06fd7184a
- hash: 932a67816b10a34d05a2621836cdf7fbf0628bbfdf66ae605c5f23455de1e0bc
- hash: a2194390105731ce33cb9a51011c42a39a440942e907099f072916a36f17ef4b
- hash: f8ae6ae9d6a13a8dddb05975930161601b5cfdd0cec30b7efdc5ba0606774998
- ip: 87.236.177.9
- domain: srv37746.hosted-by-eurohoster.org
Threat Actors Expand Abuse of Microsoft Visual Studio Code
Description
North Korean threat actors have evolved their techniques in the Contagious Interview campaign, now abusing Microsoft Visual Studio Code task configuration files. The infection chain begins when a victim opens a malicious Git repository, often disguised as part of a recruitment process. If trust is granted, arbitrary commands are executed on the system. The malware uses JavaScript payloads hosted on vercel.app to implement backdoor logic, including remote code execution, system fingerprinting, and persistent command-and-control communication. The backdoor collects host information and beacons to a C2 server every five seconds. Recent observations show further execution of similar payloads, indicating ongoing development of these tactics.
AI-Powered Analysis
Technical Analysis
This threat involves North Korean state-sponsored actors evolving their Contagious Interview campaign by abusing Microsoft Visual Studio Code's task configuration files to execute malicious commands. The infection chain starts when a victim, typically targeted through a fake recruitment process, clones or opens a malicious Git repository containing specially crafted VS Code task files. When the victim grants trust to these tasks, arbitrary commands embedded in the task configuration are executed on the local system. The attackers use JavaScript payloads hosted on the vercel.app platform to implement a backdoor with capabilities including remote code execution, system fingerprinting, and persistent command-and-control communication. The backdoor collects detailed host information and sends beacon signals to a C2 server every five seconds, ensuring continuous control and data exfiltration. The campaign primarily targets macOS systems and abuses popular developer platforms such as GitHub and GitLab to lure victims. The malware leverages Node.js and JavaScript execution techniques (T1059.007, T1059.005) and employs obfuscation (T1027) and persistence mechanisms (T1105). Indicators include multiple file hashes, an IP address (87.236.177.9), and a domain (srv37746.hosted-by-eurohoster.org). Although no CVE or known exploits in the wild are reported, the sophistication and persistence of the campaign indicate a medium-level threat with potential for escalation.
Potential Impact
For European organizations, especially those involved in software development, recruitment, and technology sectors, this threat poses significant risks. The abuse of VS Code task files can lead to unauthorized remote code execution, allowing attackers to gain persistent access to sensitive systems. This compromises confidentiality by enabling data theft, including intellectual property and personal information. Integrity is at risk as attackers can modify or inject malicious code into development environments. Availability could be affected if attackers deploy destructive payloads or disrupt operations. The use of legitimate developer tools and platforms like GitHub and GitLab increases the likelihood of successful social engineering attacks, particularly in organizations with remote or hybrid workforces. The persistent C2 communication every five seconds facilitates ongoing espionage and lateral movement within networks. European organizations with macOS endpoints and those relying heavily on VS Code are particularly vulnerable. The campaign's disguise as recruitment processes may also target HR departments, increasing the attack surface.
Mitigation Recommendations
1. Enforce strict policies on trusting VS Code workspace and task configuration files, especially from unknown or unverified Git repositories. 2. Educate employees, particularly in HR and development teams, about the risks of interacting with unsolicited recruitment-related repositories. 3. Implement endpoint detection and response (EDR) solutions capable of monitoring and alerting on suspicious VS Code task executions and Node.js script activities. 4. Monitor network traffic for frequent beaconing patterns, especially connections to suspicious domains like vercel.app or IPs such as 87.236.177.9, and block or investigate anomalous C2 communications. 5. Use application allowlisting to restrict execution of unauthorized scripts and binaries. 6. Regularly audit and restrict permissions on developer tools and repositories to minimize exposure. 7. Integrate threat intelligence feeds to detect known indicators of compromise (IOCs) such as the provided hashes and domains. 8. Encourage multi-factor authentication and least privilege principles for access to development and recruitment platforms. 9. Maintain up-to-date backups and incident response plans tailored to supply chain and developer toolchain attacks.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.jamf.com/blog/threat-actors-expand-abuse-of-visual-studio-code"]
- Adversary
- North Korea (DPRK)
- Pulse Id
- 6970c8be406455823a3d9652
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash1b26f73fa88f8c3b17adf6db12ec674481db1f92eb04806815b8fbd6086f07ef | — | |
hash67c05c1624a227959728e960e4563435db2519a24a46e95207a42ea8d4307e2d | — | |
hash71d8a974548e4e152e2c818d1febb7862632c1f9bff6adaa731bbaf6b23bd4b9 | — | |
hash71e4ea17c871b983a2cbbea7a4fbd7fe498951c8fe4a1e17377e9aa06fd7184a | — | |
hash932a67816b10a34d05a2621836cdf7fbf0628bbfdf66ae605c5f23455de1e0bc | — | |
hasha2194390105731ce33cb9a51011c42a39a440942e907099f072916a36f17ef4b | — | |
hashf8ae6ae9d6a13a8dddb05975930161601b5cfdd0cec30b7efdc5ba0606774998 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip87.236.177.9 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainsrv37746.hosted-by-eurohoster.org | — |
Threat ID: 69715f574623b1157cf35e46
Added to database: 1/21/2026, 11:20:55 PM
Last enriched: 1/21/2026, 11:35:43 PM
Last updated: 1/24/2026, 2:12:46 PM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Watering Hole Attack Targets EmEditor Users With Information-Stealing Malware
MediumSandworm behind cyberattack on Poland's power grid in late 2025
MediumRestless Spirit: New Attacks on Russian Companies
MediumTracking the VS Code Tasks Infection Vector
MediumOsiris: New Ransomware, Experienced Attackers?
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.