The North Korean risk actors behind the Contagious Interview marketing campaign, additionally tracked as WaterPlum, have been attributed to a malware household tracked as StoatWaffle that is distributed by way of malicious Microsoft Visible Studio Code (VS Code) tasks.
Using VS Code “duties.json” to distribute malware is a comparatively new tactic adopted by the risk actor since December 2025, with the assaults leveraging the “runOn: folderOpen” choice to mechanically set off its execution each time any file within the venture folder is opened in VS Code.
“This activity is configured in order that it downloads knowledge from an internet utility on Vercel no matter executing OS [operating system],” NTT Safety stated in a report printed final week. “Although we assume that the executing OS is Home windows on this article, the important behaviors are the identical for any OS.”
The downloaded payload first checks whether or not Node.js is put in within the executing atmosphere. If it is absent, the malware downloads Node.js from the official web site and installs it. Subsequently, it proceeds to launch a downloader, which periodically polls an exterior server to fetch a next-stage downloader that displays an identical habits by reaching out to a different endpoint on the identical server and executing the obtained response as Node.js code.
StoatWaffle has been discovered to ship two totally different modules –
- A stealer that captures credentials and extension knowledge saved in net browsers (Chromium-based browsers and Mozilla Firefox) and uploads them to a command-and-control (C2) server. If the compromised system runs on macOS, it additionally steals the iCloud Keychain database.
- A distant entry trojan (RAT) that communicates with the C2 server to fetch and execute instructions on the contaminated host. The instructions permit the malware to vary the present working listing, enumerate recordsdata and directories, execute Node.js code, add file, recursively search the given listing and record or add recordsdata matching a sure key phrase, run shell instructions, and terminate itself.
“StoatWaffle is a modular malware carried out by Node.js, and it has Stealer and RAT modules,” the Japanese safety vendor stated. “WaterPlum is constantly growing new malware and updating current ones.”
The event coincides with numerous campaigns mounted by the risk actor focusing on the open-source ecosystem –
- A set of malicious npm packages that distribute the PylangGhost malware, marking the primary time the malware has been propagated by way of npm packages.
- A marketing campaign often called PolinRider has implanted a malicious obfuscated JavaScript payload in a whole bunch of public GitHub repositories that culminates within the deployment of a brand new model of BeaverTail, a recognized stealer and downloader malware attributed to Contagious Interview.
- Among the many compromises are 4 repositories belonging to the Neutralinojs GitHub group. The assault is claimed to have compromised the GitHub account of a long-time neutralinojs contributor with organization-level write entry to force-push JavaScript code that retrieves encrypted payloads in Tron, Aptos, and Binance Sensible Chain (BSC) transactions to obtain and run BeaverTail. The victims are believed to have been contaminated by way of a malicious VS Code extension or an npm bundle.
Microsoft, in an evaluation of Contagious Interview this month, stated the risk actors obtain preliminary entry to developer methods by “convincingly staged recruitment processes” that mirror reputable technical interviews, in the end persuading victims into working malicious instructions or packages hosted on GitHub, GitLab, or Bitbucket as a part of the evaluation.
In some instances, targets are approached on LinkedIn. Nevertheless, the people chosen for this social engineering assault usually are not junior builders, however somewhat founders, CTOs, and senior engineers within the cryptocurrency or Web3 sector, who’re prone to have elevated entry to the corporate’s tech infrastructure and cryptocurrency wallets. A latest incident concerned the attackers unsuccessfully focusing on the founding father of AllSecure.io by way of a faux job interview.
Among the key malware households deployed as a part of these assault chains embody OtterCookie (a backdoor able to intensive knowledge theft), InvisibleFerret (a Python-based backdoor), and FlexibleFerret (a modular backdoor carried out in each Go and Python). Whereas InvisibleFerret is thought to be usually delivered by way of BeaverTail, latest intrusions have been discovered to distribute the malware as a follow-on payload, after leveraging preliminary entry obtained by OtterCookie.
It is price mentioning right here that FlexibleFerret can be known as WeaselStore. Its Go and Python variants go by the monikers GolangGhost and PylangGhost, respectively.
In an indication that the risk actors are actively refining their tradecraft, newer mutations of the VS Code tasks have eschewed Vercel-based domains for GitHub Gist-hosted scripts to obtain and execute next-stage payloads that in the end result in the deployment of FlexibleFerret. These VS Code tasks are staged on GitHub.
“By embedding focused malware supply straight into interview instruments, coding workouts, and evaluation workflows builders inherently belief, risk actors exploit the belief job seekers place within the hiring course of in periods of excessive motivation and time stress, decreasing suspicion and resistance,” the tech large stated.
In response to the continuing abuse of VS Code Duties, Microsoft has included a mitigation within the January 2026 replace (model 1.109) that introduces a brand new “activity.allowAutomaticTasks” setting, which defaults to “off” so as to enhance safety and stop unintended execution of duties outlined in “duties.json” when opening a workspace.
“The replace additionally prevents the setting from being outlined on the workspace stage, so malicious repositories with their very own .vscode/settings.json file shouldn’t be in a position to override the consumer (international) setting,” Summary Safety stated.
“This model and the latest February 2026 (model 1.110) launch additionally introduce a secondary immediate that warns the consumer when an auto-run activity is detected in a newly opened workspace. This acts as an extra guard after a consumer accepts the Workspace Belief immediate.”
In latest months, North Korean risk actors have additionally been participating in a coordinated malware marketing campaign focusing on cryptocurrency professionals by LinkedIn social engineering, faux enterprise capital corporations, and fraudulent video conferencing hyperlinks. The exercise shares overlap with clusters tracked as GhostCall and UNC1069.
“The assault chain culminates in a ClickFix-style faux CAPTCHA web page that tips victims into executing clipboard-injected instructions of their Terminal,” MacPaw’s Moonlock Lab stated. “The marketing campaign is cross-platform by design, delivering tailor-made payloads for each macOS and Home windows.”
The findings come because the U.S. Division of Justice (DoJ) introduced the sentencing of three males — Audricus Phagnasay, 25, Jason Salazar, 30, and Alexander Paul Travis, 35 — for his or her roles in furthering North Korea’s fraudulent data expertise (IT) employee scheme in violation of worldwide sanctions. All three people beforehand pleaded responsible in November 2025.
Phagnasay and Salazar had been each sentenced to 3 years of probation and a $2,000 high-quality. They had been additionally ordered to forfeit the illicit proceeds gained by taking part within the wire fraud conspiracy. Travis was sentenced to 1 yr in jail and ordered to forfeit $193,265, the quantity earned by North Koreans through the use of his id.
“These males virtually gave the keys to the web kingdom to doubtless North Korean abroad expertise staff in search of to lift illicit income for the North Korean authorities — all in return for what to them appeared like simple cash,” Margaret Heap, U.S. legal professional for the Southern District of Georgia, stated in a press release.
Final week, Flare and IBM X-Power printed an in depth take a look at the IT employee operation and its inner construction, whereas highlighting how IT staff attend prestigious universities in North Korea and undergo a rigorous interview course of themselves earlier than becoming a member of the scheme.
They’re “thought-about elite members of North Korean society and have change into an indispensable a part of the general North Korean authorities’s strategic goals,” the businesses famous. “These goals embody, however usually are not restricted to, income era, distant employment exercise, theft of company and proprietary data, extortion, and offering assist to different North Korean teams.”



