Microsoft Uncovers New Malicious Campaign Targeting Developers
This campaign is an offshoot of the more familiar and pervasive fake job interview and phony tech worker scams that have been coming from North Korea for several years.

This campaign is an offshoot of the more familiar and pervasive fake job interview and phony tech worker scams that have been coming from North Korea for several years.
February 25, 2026 | 3 min read

Microsoft researchers have uncovered a sophisticated campaign that utilizes malicious repositories disguised as legitimate development materials—specifically Next.js projects and technical assessment tasks to target developers. This ccampaign is particularly alarming because it is engineered to blend seamlessly into routine developer workflows, significantly increasing the likelihood of code execution.
The main goal is to gain remote code execution on developer systems, which often house high-value assets such as proprietary source code, critical environment secrets (cloud keys, API tokens), and access to build and cloud resources. This campaign is an offshoot of the more familiar and pervasive fake job interview and phony tech worker scams that have been coming from North Korea for several years.
The investigation was triggered by suspicious outbound connections to attacker-controlled C2 infrastructure seen through Microsoft Defender telemetry. Analysts traced repeated Node.js process communication back to malicious Bitbucket-hosted repositories, including one masquerading as a recruiting-themed technical assessment.
To grasp the full scale of the attack, investigators broadened the scope by pivoting on shared artifacts:
The researchers uncovered additional related repositories not directly referenced in initial logs, confirming a widespread threat cluster designed to exploit trust within the developer ecosystem.
Across all identified malicious repositories, the campaign employs multiple distinct entry points that all deliver the same outcome: the runtime retrieval and local execution of attacker-controlled JavaScript, which transitions into a staged command-and-control operation.
Here are the three primary execution paths identified:
Path 1: Visual Studio Code Workspace Execution
This path exploits built-in Visual Studio Code (VS Code) workspace automation to trigger execution the moment a developer opens and trusts the malicious project folder.
Path 2: Build-Time Execution During Application Development
This path targets the typical action of starting a development server, such as running npm run dev or a direct server start command.
Path 3: Server Startup via Environment Exfiltration and Dynamic RCE
The third and arguably most dangerous path activates during the application backend's startup sequence.
Regardless of which of the three paths is taken, they all lead to the same first stage payload. This initial script functions as a lightweight registrar and bootstrap channel.
After retrieval from the staging infrastructure, the script profiles the host system and repeatedly polls a registration endpoint. The C2 server can provide a durable instanceId to correlate activity and, most critically, can supply and execute additional JavaScript in memory using new Function(), enabling on-demand bootstrap and follow-on tasking without writing any additional payloads to disk.
This developer-targeting campaign highlights a growing trend where malicious actors leverage job-themed lures to circumvent traditional defenses and gain a foothold on highly privileged developer systems. The attackers' ability to blend into routine developer actions—opening a repo, running the dev server, or starting the backend—makes this threat particularly difficult to detect through standard security practices.
February 25, 2026 | 3 min read
Dennis Fisher is an award-winning journalist and author. He is one of the co-founders of Decipher and Threatpost and has been writing about cybersecurity since 2000. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. He is the author of 2.5 novels and once met Shaq. Contact: dennis at decipher.sc.