Microsoft Defender Experts uncovered a coordinated attack campaign targeting developers via malicious Next.js repositories disguised as legitimate job assessment projects. The campaign uses three execution paths: VS Code workspace automation (.vscode/tasks.json with runOn folderOpen), trojanized build-time assets like

15m read time From microsoft.com
Post cover image
Table of contents
Initial discovery and scope expansionMultiple execution paths leading to a shared backdoorStage 1 C2 beacon and registrationStage 2 C2 controller and tasking loaderSummaryMitigation and protection guidanceIndicators of compromiseReferencesLearn more

Sort: