🎯Basically, hackers pretend to offer jobs to infect developers' code with malware.
What Happened
Void Dokkaebi, also known as Famous Chollima, has launched a sophisticated malware campaign that exploits fake job interviews to compromise developer repositories. This campaign transforms trusted coding environments into malware delivery channels, creating a self-propagating threat that can infect numerous developers through their own code contributions.
How It Works
The attack begins with the threat actor posing as a recruiter from cryptocurrency or AI firms. Victims are lured into cloning and executing malicious code repositories as part of a supposed job interview. Once a developer's machine is compromised, it becomes a launchpad for further infections. This is achieved through two primary methods:
- Passive Spread via VS Code: The attacker configures a malicious
.vscode/tasks.jsonfile that runs automatically when the victim opens the project in Visual Studio Code. This task can fetch a backdoor or execute a bundled malicious file, infecting the developer's ecosystem. - Active Code Injection: The attacker injects obfuscated JavaScript into the victim's repositories, tampering with commit history to conceal the malicious changes. This code executes automatically when the project is built or run, propagating the infection to other developers who clone the repository.
Who's Being Targeted
The campaign primarily targets software developers with access to cryptocurrency wallets and CI/CD pipelines. Notable organizations affected include DataStax and Neutralinojs, where multiple repositories were compromised, amplifying the risk to their contributors and downstream projects.
Signs of Infection
Developers may notice unusual behavior in their repositories, such as unexpected tasks in VS Code or changes in commit history that they did not authorize. Additionally, if their projects begin to exhibit strange functionality or if they receive alerts from security tools, these could be indicators of a compromise.
How to Protect Yourself
To mitigate the risk of infection, developers should:
Detection
- 1.Review Code Carefully: Always inspect configuration files and commit history for unauthorized changes.
- 2.Use .gitignore: Ensure that sensitive folders like
.vscodeare included in.gitignoreto prevent accidental commits.
Removal
- 3.Educate on Social Engineering: Be cautious of unsolicited job offers and verify the legitimacy of any recruitment communications.
- 4.Implement Security Tools: Use security tools that can detect malicious code injections and monitor repository activity.
Conclusion
The Void Dokkaebi campaign highlights a significant shift in malware distribution methods, leveraging social engineering and developer trust to create a widespread supply chain threat. Organizations must remain vigilant and proactive in their security measures to protect against such evolving threats.
🔒 Pro insight: This campaign exemplifies the growing trend of supply chain attacks exploiting developer trust, necessitating enhanced security protocols in CI/CD environments.




