Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/Threats/Hackers Abuse VS Code to Execute Malicious Payloads
Threats

Hackers Abuse VS Code to Execute Malicious Payloads

North Korean threat actors are weaponizing Microsoft Visual Studio Code, one of the world’s most popular code editors. This tactic marks a significant expansion of their attack capabilities....

David kimber
David kimber
January 21, 2026 3 Min Read
0 0

North Korean threat actors are weaponizing Microsoft Visual Studio Code, one of the world’s most popular code editors. This tactic marks a significant expansion of their attack capabilities.

The Contagious Interview campaign has evolved significantly, shifting from traditional social engineering tactics to targeting developers through trusted development environments.

This new approach marks a concerning escalation in how adversaries exploit legitimate software tools to deliver sophisticated malware directly onto victim systems.

The attack chain begins when developers unknowingly clone malicious repositories, often disguised as recruitment assignments or technical job interviews.

The attack represents a shift in tactics beyond previously documented ClickFix-based delivery methods. Rather than relying on suspicious email links, attackers now embed malicious commands within Visual Studio Code configuration files.

Chain of events (Source - Jamf)
Chain of events (Source – Jamf)

When a victim opens a compromised repository in Visual Studio Code and grants repository trust—a standard workflow action—the application automatically processes the repository’s tasks.json configuration file.

This file can contain embedded commands that execute arbitrary code on the system, effectively bypassing user awareness.

Jamf analysts and researchers identified additional abuse of Visual Studio Code’s task configuration files in December, discovering dictionary files containing heavily obfuscated JavaScript code.

This JavaScript executes silently when a victim opens a malicious repository. The security researchers also documented how attackers introduced increasingly sophisticated obfuscation techniques to evade detection and analysis.

The Infection Mechanism and Execution Flow

The infection begins when a developer clones and opens a malicious Git repository hosted on GitHub or GitLab.

On macOS systems, the malware uses a background shell command combining nohup bash with curl to retrieve a JavaScript payload remotely from Vercel-hosted infrastructure.

The payload executes directly in the Node.js runtime, allowing the attack to continue even if Visual Studio Code closes.

Visual Studio Code prompts the user to trust the repository author (Source - Jamf)
Visual Studio Code prompts the user to trust the repository author (Source – Jamf)

This persistence mechanism is particularly effective because it operates independently from the editor’s process.

Once executed, the JavaScript payload establishes a persistent connection to a command-and-control server located at 87.236.177.93, beaconing every five seconds.

task.json (Source - Jamf)
task.json (Source – Jamf)

The malware collects system information including hostname, MAC addresses, and operating system details, then sends this data to attackers for further tasking.

The payload maintains a persistent execution loop capable of accepting additional JavaScript instructions from the C2 server, enabling attackers to execute arbitrary commands and maintain long-term access.

Developers should carefully review repository contents before marking them as trusted and scrutinize tasks.json files for suspicious configurations that could indicate malicious intent.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Critical GNU InetUtils Flaw: Unauthenticated Vulnerability Allows

Next Post

Detect Microsoft Teams Attackers via External Domain Anomal

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us