Tracking the VS Code Tasks Infection Vector
The Contagious Interview campaign, attributed to North Korea, continues to target software developers through fake recruitment schemes. A new technique in their arsenal leverages Microsoft Visual Studio Code task files to execute malicious code when a project is opened. The report documents observations of this vector, presents GitHub-based discovery methods, highlights findings including a new malicious NPM package, and outlines detection opportunities. The campaign exploits VS Code's Task feature, using the runOptions property to automatically execute malicious shell commands when a workspace is opened. Various obfuscation techniques are employed, including hiding commands with whitespace and masquerading payloads as image or font files.
AI Analysis
Technical Summary
The Contagious Interview campaign is a targeted malware operation attributed to the North Korean Lazarus Group, focusing on software developers through fake recruitment schemes. The campaign introduces a novel infection vector by exploiting Microsoft Visual Studio Code's Task feature, specifically the runOptions property, which can be configured to automatically execute shell commands when a workspace is opened. This allows attackers to achieve remote code execution silently as developers open infected projects. The malicious commands are heavily obfuscated using techniques such as whitespace hiding and masquerading payloads as benign files like images or fonts, complicating detection. The campaign also involves a malicious NPM package, expanding the infection surface through supply chain compromise. GitHub repositories are leveraged both as infection vectors and discovery points, with attackers embedding malicious task files in public or private projects. The attack chain includes execution of shell commands (T1059.007), user execution tactics (T1204.002), process injection (T1055), obfuscation (T1027, T1564.001), and use of remote services (T1102.002). Although no known exploits in the wild have been reported, the technique is sophisticated and stealthy, targeting developer environments where trust in project files is high. The campaign's use of recruitment lures increases the likelihood of victim engagement, making it a credible threat to software development workflows.
Potential Impact
For European organizations, this threat poses a significant risk to software development environments, potentially leading to unauthorized code execution, data exfiltration, and supply chain compromise. The infection vector targets developers who often have elevated privileges and access to critical source code repositories and build systems, amplifying the impact. Compromise could result in intellectual property theft, insertion of backdoors into software products, and disruption of development pipelines. Given the campaign's stealth and obfuscation, detection may be delayed, increasing dwell time and potential damage. Organizations involved in critical infrastructure, finance, and technology sectors are particularly vulnerable due to the strategic value of their software assets. The use of recruitment schemes may also lead to social engineering risks beyond technical exploitation. Overall, the campaign threatens confidentiality, integrity, and availability of software development processes and outputs.
Mitigation Recommendations
1. Implement strict code review policies focusing on VS Code task files and configuration files before merging or using them in development environments. 2. Enforce the use of trusted package registries and conduct thorough vetting of NPM packages, including scanning for malicious code or unusual behaviors. 3. Monitor and restrict the use of VS Code runOptions that enable automatic command execution, possibly disabling this feature or alerting on its usage. 4. Employ static and dynamic analysis tools to detect obfuscated scripts and suspicious payloads within development repositories. 5. Educate developers about the risks of opening unknown or unsolicited project files, especially those received via recruitment or social engineering channels. 6. Use endpoint detection and response (EDR) solutions to monitor for anomalous shell command executions originating from developer tools. 7. Regularly audit GitHub repositories and other code hosting platforms for unauthorized or suspicious task files and dependencies. 8. Implement network segmentation to limit the impact of any compromise originating from developer workstations. 9. Maintain up-to-date threat intelligence feeds to detect emerging indicators related to this campaign. 10. Consider application whitelisting for developer environments to prevent execution of unauthorized scripts.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Finland, Estonia
Indicators of Compromise
- url: https://www.jsonkeeper.com/b/QJZCG
- url: https://www.regioncheck.xyz/settings/linux?flag=8'
- url: https://www.regioncheck.xyz/settings/mac?flag=8'
- url: https://www.regioncheck.xyz/settings/windows?flag=8
- domain: www.regioncheck.xyz
- domain: www.vscodeconfig.com
- domain: api-server-mocha.vercel.app
- domain: brantwork.vercel.app
- domain: codeviewer-fawn.vercel.app
- domain: codeviewer-three.vercel.app
- domain: coreviewer.vercel.app
- domain: editorsettings.vercel.app
- domain: isvalid-region.vercel.app
- domain: isvalid-regions.vercel.app
- domain: jerryfox-platform.vercel.app
- domain: tailwind-version-four.vercel.app
- domain: task-hrec.vercel.app
- domain: thopywork.vercel.app
- domain: vscode-bootstrapper.vercel.app
- domain: vscode-config-setting.vercel.app
- domain: vscode-config-settings.vercel.app
- domain: vscode-config.vercel.app
- domain: vscode-helper-132.vercel.app
- domain: vscode-helper171-ruby.vercel.app
- domain: vscode-helper171.vercel.app
- domain: vscode-lnc.vercel.app
- domain: vscode-load-config.vercel.app
- domain: vscode-load.onrender.com
- domain: vscode-project-setting.vercel.app
- domain: vscode-settings-bootstrap.vercel.app
- domain: vscode-settings-config.vercel.app
- domain: vscode-toolkit-bootstrap.vercel.app
- domain: vscodesettingstask.vercel.app
- email: aman.jaiswal@web3paymentsolutions.io
- email: andrew@koinos.us
- email: andrew_watson@koinos.us
- email: bulat@parity.io
- email: kblucky0219@proton.me
- email: leandro@kasta.io
- email: philip@cryptoasis.com
Tracking the VS Code Tasks Infection Vector
Description
The Contagious Interview campaign, attributed to North Korea, continues to target software developers through fake recruitment schemes. A new technique in their arsenal leverages Microsoft Visual Studio Code task files to execute malicious code when a project is opened. The report documents observations of this vector, presents GitHub-based discovery methods, highlights findings including a new malicious NPM package, and outlines detection opportunities. The campaign exploits VS Code's Task feature, using the runOptions property to automatically execute malicious shell commands when a workspace is opened. Various obfuscation techniques are employed, including hiding commands with whitespace and masquerading payloads as image or font files.
AI-Powered Analysis
Technical Analysis
The Contagious Interview campaign is a targeted malware operation attributed to the North Korean Lazarus Group, focusing on software developers through fake recruitment schemes. The campaign introduces a novel infection vector by exploiting Microsoft Visual Studio Code's Task feature, specifically the runOptions property, which can be configured to automatically execute shell commands when a workspace is opened. This allows attackers to achieve remote code execution silently as developers open infected projects. The malicious commands are heavily obfuscated using techniques such as whitespace hiding and masquerading payloads as benign files like images or fonts, complicating detection. The campaign also involves a malicious NPM package, expanding the infection surface through supply chain compromise. GitHub repositories are leveraged both as infection vectors and discovery points, with attackers embedding malicious task files in public or private projects. The attack chain includes execution of shell commands (T1059.007), user execution tactics (T1204.002), process injection (T1055), obfuscation (T1027, T1564.001), and use of remote services (T1102.002). Although no known exploits in the wild have been reported, the technique is sophisticated and stealthy, targeting developer environments where trust in project files is high. The campaign's use of recruitment lures increases the likelihood of victim engagement, making it a credible threat to software development workflows.
Potential Impact
For European organizations, this threat poses a significant risk to software development environments, potentially leading to unauthorized code execution, data exfiltration, and supply chain compromise. The infection vector targets developers who often have elevated privileges and access to critical source code repositories and build systems, amplifying the impact. Compromise could result in intellectual property theft, insertion of backdoors into software products, and disruption of development pipelines. Given the campaign's stealth and obfuscation, detection may be delayed, increasing dwell time and potential damage. Organizations involved in critical infrastructure, finance, and technology sectors are particularly vulnerable due to the strategic value of their software assets. The use of recruitment schemes may also lead to social engineering risks beyond technical exploitation. Overall, the campaign threatens confidentiality, integrity, and availability of software development processes and outputs.
Mitigation Recommendations
1. Implement strict code review policies focusing on VS Code task files and configuration files before merging or using them in development environments. 2. Enforce the use of trusted package registries and conduct thorough vetting of NPM packages, including scanning for malicious code or unusual behaviors. 3. Monitor and restrict the use of VS Code runOptions that enable automatic command execution, possibly disabling this feature or alerting on its usage. 4. Employ static and dynamic analysis tools to detect obfuscated scripts and suspicious payloads within development repositories. 5. Educate developers about the risks of opening unknown or unsolicited project files, especially those received via recruitment or social engineering channels. 6. Use endpoint detection and response (EDR) solutions to monitor for anomalous shell command executions originating from developer tools. 7. Regularly audit GitHub repositories and other code hosting platforms for unauthorized or suspicious task files and dependencies. 8. Implement network segmentation to limit the impact of any compromise originating from developer workstations. 9. Maintain up-to-date threat intelligence feeds to detect emerging indicators related to this campaign. 10. Consider application whitelisting for developer environments to prevent execution of unauthorized scripts.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.abstract.security/blog/contagious-interview-tracking-the-vs-code-tasks-infection-vector#appendix-indicators"]
- Adversary
- Lazarus Group
- Pulse Id
- 697349c8d32812c0e5094e4d
- Threat Score
- null
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://www.jsonkeeper.com/b/QJZCG | — | |
urlhttps://www.regioncheck.xyz/settings/linux?flag=8' | — | |
urlhttps://www.regioncheck.xyz/settings/mac?flag=8' | — | |
urlhttps://www.regioncheck.xyz/settings/windows?flag=8 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainwww.regioncheck.xyz | — | |
domainwww.vscodeconfig.com | — | |
domainapi-server-mocha.vercel.app | — | |
domainbrantwork.vercel.app | — | |
domaincodeviewer-fawn.vercel.app | — | |
domaincodeviewer-three.vercel.app | — | |
domaincoreviewer.vercel.app | — | |
domaineditorsettings.vercel.app | — | |
domainisvalid-region.vercel.app | — | |
domainisvalid-regions.vercel.app | — | |
domainjerryfox-platform.vercel.app | — | |
domaintailwind-version-four.vercel.app | — | |
domaintask-hrec.vercel.app | — | |
domainthopywork.vercel.app | — | |
domainvscode-bootstrapper.vercel.app | — | |
domainvscode-config-setting.vercel.app | — | |
domainvscode-config-settings.vercel.app | — | |
domainvscode-config.vercel.app | — | |
domainvscode-helper-132.vercel.app | — | |
domainvscode-helper171-ruby.vercel.app | — | |
domainvscode-helper171.vercel.app | — | |
domainvscode-lnc.vercel.app | — | |
domainvscode-load-config.vercel.app | — | |
domainvscode-load.onrender.com | — | |
domainvscode-project-setting.vercel.app | — | |
domainvscode-settings-bootstrap.vercel.app | — | |
domainvscode-settings-config.vercel.app | — | |
domainvscode-toolkit-bootstrap.vercel.app | — | |
domainvscodesettingstask.vercel.app | — |
| Value | Description | Copy |
|---|---|---|
emailaman.jaiswal@web3paymentsolutions.io | — | |
emailandrew@koinos.us | — | |
emailandrew_watson@koinos.us | — | |
emailbulat@parity.io | — | |
emailkblucky0219@proton.me | — | |
emailleandro@kasta.io | — | |
emailphilip@cryptoasis.com | — |
Threat ID: 697352904623b1157c3211dc
Added to database: 1/23/2026, 10:50:56 AM
Last enriched: 1/23/2026, 11:05:35 AM
Last updated: 1/24/2026, 5:21:40 AM
Views: 86
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-01-23
MediumWatering Hole Attack Targets EmEditor Users With Information-Stealing Malware
MediumPhishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
MediumIn Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice
MediumRestless Spirit: New Attacks on Russian Companies
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.