Malware & RansomwareHIGH

Malware - North Korean Hackers Deploy StoatWaffle via VS Code

THThe Hacker News
StoatWaffleNorth KoreaVisual Studio CodeWaterPlummalware
🎯

Basically, North Korean hackers use a coding tool to secretly install malware on computers.

Quick Summary

North Korean hackers are exploiting Visual Studio Code to deploy StoatWaffle malware. Developers are at risk of credential theft and system compromise. Stay alert and verify your sources to protect your data.

What Happened

North Korean hackers, known for their Contagious Interview campaign, have recently adopted a new tactic to distribute StoatWaffle malware. This malware is embedded within malicious Microsoft Visual Studio Code (VS Code) projects. By utilizing the tasks.json file in VS Code, these hackers can execute the malware automatically whenever a project folder is opened. This method has been in use since December 2025, marking a significant evolution in their attack strategies.

The malware operates by first checking if Node.js is installed on the victim's machine. If it's not found, the malware downloads and installs it from the official Node.js website. Once installed, it connects to an external server to download additional malicious payloads, which can include credential stealers and remote access tools. This approach allows the attackers to maintain control over infected machines and extract sensitive information.

Who's Being Targeted

The primary targets of this campaign are developers, particularly those involved in cryptocurrency and Web3 sectors. The attackers use social engineering tactics, often posing as recruiters conducting technical interviews. This method is particularly effective as it exploits the trust developers place in legitimate hiring processes. By targeting experienced professionals, they aim to gain access to valuable corporate infrastructure and cryptocurrency wallets.

Recent incidents have shown that even high-profile individuals, such as founders and CTOs, have been approached through fake job interviews. This indicates the attackers are not only looking for easy targets but are also sophisticated in their approach, leveraging social engineering to bypass traditional security measures.

Signs of Infection

Victims of the StoatWaffle malware may notice several signs of infection. These can include unexpected behavior from their web browsers, such as unusual pop-ups or slow performance due to the malware's background activities. Additionally, users may find that their credentials or sensitive information have been compromised, particularly if they notice unauthorized transactions or account access.

Another indicator of infection is the presence of new applications or scripts that were not intentionally installed by the user. The malware's ability to download additional payloads means that infections can evolve, leading to more severe consequences over time.

How to Protect Yourself

To safeguard against these types of attacks, developers should be cautious when interacting with job offers and technical assessments. Always verify the legitimacy of the source before executing any code or downloading packages. Additionally, keeping software like VS Code and Node.js updated can help mitigate vulnerabilities that attackers might exploit.

Microsoft has introduced new security features in recent updates to VS Code, including the task.allowAutomaticTasks setting, which is turned off by default. This change aims to prevent the automatic execution of tasks from malicious repositories. Users are encouraged to enable this setting and remain vigilant against suspicious projects or extensions to protect their systems from malware like StoatWaffle.

🔒 Pro insight: This evolving tactic highlights a concerning trend in malware distribution, leveraging trusted development environments to bypass security protocols.

Original article from

The Hacker News

Read Full Article

Related Pings

HIGHMalware & Ransomware

Malware - DarkSword Exploit Kit Leaked for iPhones

A new exploit kit called DarkSword has been leaked, enabling hackers to target millions of iPhones. Users running outdated iOS versions are at risk. It's crucial to update your devices immediately to stay secure.

TechCrunch Security·
HIGHMalware & Ransomware

Malware - TeamPCP Deploys Iran-Targeted Wiper in Attacks

TeamPCP has launched a wiper malware targeting Iranian Kubernetes systems. This attack raises serious concerns about data loss and escalating cyber warfare. Organizations must act quickly to secure their systems.

BleepingComputer·
HIGHMalware & Ransomware

Malware - Iran-Backed Handala Uses Telegram for C2

The FBI has alerted that the Iran-backed Handala group is using Telegram to push malware targeting journalists and dissidents. This trend highlights the risks of trusted platforms being exploited for malicious activities. Organizations must stay vigilant and adapt their security measures accordingly.

SC Media·
HIGHMalware & Ransomware

Malvertising Campaign - Tax Ads Lead to EDR Killer Deployment

A new malvertising campaign is exploiting tax season to deploy an EDR killer. Targeting U.S. taxpayers, this attack uses fake Google Ads to bypass security tools. Stay vigilant and only download forms from trusted sources.

Cyber Security News·
HIGHMalware & Ransomware

Malware - Iranian Hackers Target Opponents via Telegram

Iranian hackers are on the prowl, deploying malware via Telegram to target dissidents and journalists. This alarming campaign poses serious risks to anyone opposing the Iranian regime. Stay informed and vigilant to protect your data.

CyberScoop·
HIGHMalware & Ransomware

Malware - SEO Poisoning Campaign Delivers AsyncRAT to Users

A new SEO poisoning campaign has been discovered, targeting Windows users with trojanized software. Over 25 popular applications are being impersonated to deliver AsyncRAT malware. This sophisticated attack can lead to significant data theft, making it crucial for users to stay vigilant.

Cyber Security News·