A sophisticated social engineering campaign attributed to North Korean state-sponsored actors is targeting software developers by weaponizing trusted development tools and platforms. The campaign, named "Contagious Interview," leverages fake job recruitment processes to lure developers into cloning malicious GitHub or GitLab repositories. Researchers at Jamf Threat Labs discovered that the attack specifically abuses Microsoft Visual Studio Code (VS Code) functionality. When a developer clones and trusts the malicious project, a pre-configured tasks.json file automatically executes, deploying a backdoor onto the victim's system without further interaction. This campaign, linked to the notorious Lazarus Group, primarily targets macOS users in the cryptocurrency, fintech, and blockchain industries, aiming for espionage and financial theft.
The "Contagious Interview" campaign is a multi-stage attack that blends social engineering with abuse of legitimate developer workflows.
tasks.json file within the .vscode directory.tasks.json.This attack chain is highly effective because it exploits the trust inherent in developer ecosystems and the automated features of modern IDEs.
The threat actor, identified as PurpleBravo by Recorded Future, demonstrates a clear understanding of developer environments.
tasks.json configuration file. This file is intended for legitimate automation but is repurposed here to act as an execution trigger.T1059.007 - JavaScript execution, data exfiltration, and deployment of secondary payloads.T1566.002 - Spearphishing Link: Using social engineering and links to malicious repositories to initiate the attack.T1195.001 - Compromise Software Dependencies and Development Tools: Weaponizing a VS Code project hosted on GitHub.T1204.002 - Malicious File: Tricking the user into opening a malicious project folder, which leads to code execution.T1059.007 - JavaScript: The primary payload is a JavaScript-based backdoor.T1543.001 - Create or Modify System Process: LaunchAgent: A common method for achieving persistence on macOS.T1071.001 - Application Layer Protocol: Web Protocols: Using HTTPS for C2 communications to blend in with normal traffic.A successful compromise can have severe consequences for both the individual developer and their employer. Attackers gain a persistent foothold inside a trusted environment, from which they can:
Given the targeting of the fintech and crypto sectors, the primary motive is likely financial gain, alongside traditional state-sponsored espionage.
node processes being spawned by Code or Code Helper processes, especially if they are executing scripts from unexpected locations.node or VS Code-related processes to unusual domains or Vercel-hosted URLs (*.vercel.app)..vscode/tasks.json files in cloned repositories for suspicious shell commands, curl, or wget executions, especially those with isBackground: true.~/Library/LaunchAgents/ and /Library/LaunchDaemons/..vscode/tasks.json without opening them in an IDE.M1017 - User Training): Train developers to be skeptical of unsolicited job offers and to never blindly trust code from unknown sources. Emphasize the security implications of IDE features like Workspace Trust.M1050 - Exploit Protection): Configure VS Code to disable automatic task execution or run in a restricted mode by default. Developers should manually inspect all configuration files before granting trust.M1048 - Application Isolation and Sandboxing): Encourage developers to use sandboxed environments (e.g., virtual machines, containers) when evaluating code from third parties. This contains any potential malware and prevents it from accessing the host system or network.M1038 - Execution Prevention): Use application control solutions to restrict the execution of unsigned scripts or binaries, particularly those downloaded from the internet.Educate developers on the risks of social engineering and the specific threat of weaponized IDE features like VS Code's Workspace Trust.
Advise developers to use dedicated VMs or containers for evaluating code from untrusted external sources to contain potential threats.
Mapped D3FEND Techniques:
Implement policies that prevent the execution of arbitrary scripts downloaded from the internet, especially within developer environments.
Mapped D3FEND Techniques:
Configure VS Code and other IDEs with stricter security settings by default, such as disabling automatic task execution.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats