Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
Home/Threats/Void Dokkaebi Hackers Use Fake Job Interviews for Spread Malware
Threats

Void Dokkaebi Hackers Use Fake Job Interviews for Spread Malware

A North Korea-linked hacking group, identified as Void Dokkaebi and also tracked as Famous Chollima, is actively targeting software developers. The group employs a sophisticated campaign that uses...

Jennifer sherman
Jennifer sherman
April 24, 2026 3 Min Read
13 0

A North Korea-linked hacking group, identified as Void Dokkaebi and also tracked as Famous Chollima, is actively targeting software developers. The group employs a sophisticated campaign that uses fake job interviews to trick victims into installing malware, as detailed in a recent security

The attack starts with a convincing setup. Threat actors pose as recruiters from cryptocurrency and artificial intelligence firms, reaching out to developers on professional platforms.

During a fake interview, the target is asked to clone a repository on GitHub, GitLab, or Bitbucket and run it as a “technical assessment.”

These repositories look like legitimate projects but carry hidden malicious code that runs the moment the developer opens the folder.

What makes this campaign dangerous is what happens after that first infection. Trend Micro analysts identified that Void Dokkaebi does not stop at a single compromised developer.

The attacker uses the victim’s own machine and repositories to infect the next wave of developers, creating a worm-like chain that spreads across organizations without further social engineering.

By March 2026, the scale had grown significantly. Analysis by Trend Micro Research identified more than 750 infected repositories, over 500 malicious VS Code task configurations, and 101 instances of a commit tampering tool across public code hosting platforms.

Repositories belonging to organizations such as DataStax and Neutralinojs were also found carrying infection markers, showing the campaign had reached into popular open-source projects.

Once a compromised developer pushes code to GitHub or reuses components elsewhere, the malicious files travel with it, waiting for the next developer to open the project and trigger the attack, creating a cycle that grows with every commit.

Inside the Infection Chain

The campaign uses two methods working together. The first abuses Visual Studio Code workspace files, specifically a hidden file called .vscode/tasks.json, configured to run automatically when the developer opens the project folder.

When the developer accepts the workspace trust prompt, the malicious task executes without further interaction, fetching a backdoor from a remote URL or launching a disguised file inside the repository carrying the payload.

Infection paths used by Void Dokkaebi (Source - Trend Micro)
Infection paths used by Void Dokkaebi (Source – Trend Micro)

The second method is more direct. After gaining remote access to a developer’s machine, obfuscated JavaScript is injected into source files in the victim’s own repositories.

The code is pushed to the far right of the screen using whitespace, hiding it during quick reviews.

A batch script called temp_auto_push.bat rewrites git commit history by copying the original author name, timestamp, and message before force-pushing the tampered version to appear as a legitimate commit.

Code snippets of a GitHub repository containing the injected code (Source - Trend Micro)
Code snippets of a GitHub repository containing the injected code (Source – Trend Micro)

The delivered payload is a variant of the DEVSPOPPER remote access trojan, a cross-platform Node.js-based tool. It connects to a command-and-control server via WebSocket and uses HTTP for file exfiltration.

A multi-operator session system lets several threat actors work on one compromised machine at the same time.

The RAT detects and avoids CI/CD environments and cloud sandboxes, running only on real developer workstations, so automated pipeline scanning will miss it.

Developers and organizations can take steps to reduce exposure. Always run interview code in isolated or disposable virtual environments destroyed after the session, and never execute it on personal or production machines.

Add .vscode/ to .gitignore and enforce this across all organizational repositories to block passive worm propagation. Require GPG- or SSH-signed commits with branch protection and mandatory pull requests to stop the commit-tampering tool.

Audit source code for infection markers global′!′′!′ and global’_V’, and check for temp_auto_push.bat.

Monitor outbound connections to blockchain API endpoints such as api.trongrid.io and Binance Smart Chain RPC endpoints from developer workstations.

Endpoint-level detection on developer workstations is essential since the RAT avoids CI/CD environments by design.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwareThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Python Vulnerability Threatens Windows with Out-of-Bounds

Next Post

Hackers Use Pastebin-Hosted PowerShell Script to Steal Telegram

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
May 16, 2026
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us