North Korean Hackers Lure Developers with Fake Job Interviews, Backdoor macOS via VS Code

North Korea's 'Contagious Interview' Campaign Weaponizes Malicious VS Code Projects on GitHub

HIGH
January 23, 2026
6m read
Threat ActorSupply Chain AttackPhishing

Related Entities

Threat Actors

Lazarus Group PurpleBravo

Products & Tech

Visual Studio Code

Other

Full Report

Executive Summary

A sophisticated social engineering campaign attributed to North Korean state-sponsored actors is targeting software developers by weaponizing trusted development tools and platforms. The campaign, named "Contagious Interview," leverages fake job recruitment processes to lure developers into cloning malicious GitHub or GitLab repositories. Researchers at Jamf Threat Labs discovered that the attack specifically abuses Microsoft Visual Studio Code (VS Code) functionality. When a developer clones and trusts the malicious project, a pre-configured tasks.json file automatically executes, deploying a backdoor onto the victim's system without further interaction. This campaign, linked to the notorious Lazarus Group, primarily targets macOS users in the cryptocurrency, fintech, and blockchain industries, aiming for espionage and financial theft.


Threat Overview

The "Contagious Interview" campaign is a multi-stage attack that blends social engineering with abuse of legitimate developer workflows.

  1. Initial Contact: Attackers, posing as recruiters, approach developers with enticing job opportunities, often for roles in high-value sectors like cryptocurrency or fintech.
  2. Technical Assessment: The developer is asked to complete a technical challenge which requires them to clone a Git repository from a public platform like GitHub.
  3. Weaponized Repository: The repository contains a seemingly legitimate coding project but includes a hidden, malicious tasks.json file within the .vscode directory.
  4. Execution via Trust: When the developer opens the project folder in VS Code, the IDE prompts them to trust the folder's author. If the user clicks "Trust," VS Code automatically parses and executes the commands within tasks.json.
  5. Payload Delivery: On macOS, the task executes a background shell command that downloads a JavaScript payload from Vercel-hosted infrastructure and runs it using Node.js. This establishes a persistent backdoor on the compromised machine.

This attack chain is highly effective because it exploits the trust inherent in developer ecosystems and the automated features of modern IDEs.

Technical Analysis

The threat actor, identified as PurpleBravo by Recorded Future, demonstrates a clear understanding of developer environments.

  • Attack Vector: The core of the attack is the abuse of VS Code's Workspace Trust feature and the tasks.json configuration file. This file is intended for legitimate automation but is repurposed here to act as an execution trigger.
  • Payload: The initial payload is a JavaScript file executed via Node.js. This choice of language is common in the target demographic (web and fintech developers) and less likely to be flagged by traditional AV than a binary executable.
  • Persistence: The malware establishes persistence to survive reboots and ensure long-term access. On macOS, this can be achieved by creating LaunchAgents or LaunchDaemons.
  • Command and Control (C2): The backdoor communicates with a C2 server, sending system fingerprints (hostname, MAC address) and awaiting further commands. This allows for T1059.007 - JavaScript execution, data exfiltration, and deployment of secondary payloads.

MITRE ATT&CK TTPs

Impact Assessment

A successful compromise can have severe consequences for both the individual developer and their employer. Attackers gain a persistent foothold inside a trusted environment, from which they can:

  • Steal intellectual property, source code, and proprietary algorithms.
  • Compromise cryptocurrency wallets and steal digital assets.
  • Pivot to other systems within the corporate network.
  • Inject malicious code into the software supply chain, affecting the employer's customers.
  • Conduct further espionage and intelligence gathering.

Given the targeting of the fintech and crypto sectors, the primary motive is likely financial gain, alongside traditional state-sponsored espionage.

Cyber Observables for Detection

  • Process Execution: Monitor for node processes being spawned by Code or Code Helper processes, especially if they are executing scripts from unexpected locations.
  • Network Connections: Look for network connections from node or VS Code-related processes to unusual domains or Vercel-hosted URLs (*.vercel.app).
  • File System: Scrutinize .vscode/tasks.json files in cloned repositories for suspicious shell commands, curl, or wget executions, especially those with isBackground: true.
  • Persistence Locations: On macOS, monitor for new or modified files in ~/Library/LaunchAgents/ and /Library/LaunchDaemons/.

Detection & Response

  1. EDR/Endpoint Security: Configure EDR solutions to alert on VS Code spawning shell or Node.js processes that make external network connections. Use process tree analysis (D3-PA) to identify this anomalous behavior.
  2. Developer Awareness: Educate developers about the risks of VS Code's Workspace Trust feature and the dangers of cloning and executing code from untrusted sources, even for interviews.
  3. Network Monitoring: Implement outbound traffic filtering (D3-OTF) and analyze logs for connections to known malicious infrastructure or suspicious Vercel subdomains.
  4. Repository Scanning: Before cloning, use tools to inspect repository contents for suspicious configuration files like .vscode/tasks.json without opening them in an IDE.

Mitigation

  1. User Training (M1017 - User Training): Train developers to be skeptical of unsolicited job offers and to never blindly trust code from unknown sources. Emphasize the security implications of IDE features like Workspace Trust.
  2. Application Hardening (M1050 - Exploit Protection): Configure VS Code to disable automatic task execution or run in a restricted mode by default. Developers should manually inspect all configuration files before granting trust.
  3. Application Isolation (M1048 - Application Isolation and Sandboxing): Encourage developers to use sandboxed environments (e.g., virtual machines, containers) when evaluating code from third parties. This contains any potential malware and prevents it from accessing the host system or network.
  4. Execution Prevention (M1038 - Execution Prevention): Use application control solutions to restrict the execution of unsigned scripts or binaries, particularly those downloaded from the internet.

Timeline of Events

1
January 23, 2026
This article was published

MITRE ATT&CK Mitigations

Educate developers on the risks of social engineering and the specific threat of weaponized IDE features like VS Code's Workspace Trust.

Advise developers to use dedicated VMs or containers for evaluating code from untrusted external sources to contain potential threats.

Mapped D3FEND Techniques:

Implement policies that prevent the execution of arbitrary scripts downloaded from the internet, especially within developer environments.

Mapped D3FEND Techniques:

Configure VS Code and other IDEs with stricter security settings by default, such as disabling automatic task execution.

Mapped D3FEND Techniques:

Sources & References

'Contagious Interview' Attack Now Delivers Backdoor Via VS Code
Dark Reading (darkreading.com) January 21, 2026
North Korean Hackers Target macOS Developers via Malicious VS Code Projects
SecurityWeek (securityweek.com) January 21, 2026
PurpleBravo's Targeting of the IT Software Supply Chain
Recorded Future (recordedfuture.com) January 21, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Social EngineeringmacOSVS CodeDeveloper TargetingCryptocurrencyFintech

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading