Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Exploit VS Code for New Malware

North Korean Hackers Exploit VS Code for New Malware

Posted on March 23, 2026 By CWS

North Korean cybercriminals have developed an innovative method for distributing malware by exploiting Microsoft Visual Studio Code (VS Code). The malicious software, identified as StoatWaffle, is disseminated through compromised VS Code projects, marking a new tactic in their cyber arsenal. The hackers, linked to the WaterPlum operation, are leveraging VS Code’s ‘tasks.json’ to automate the malware’s execution whenever files in the project folder are accessed.

Understanding the StoatWaffle Malware

StoatWaffle represents a sophisticated malware family that utilizes Node.js to deploy its malicious payload. Once downloaded, the malware checks for the presence of Node.js in the system environment. If absent, it retrieves and installs Node.js from its official source before initiating a downloader. This downloader connects to an external server, retrieving further instructions and executing them as Node.js scripts.

The malware consists of two primary components: a stealer and a remote access trojan (RAT). The stealer targets sensitive information stored in web browsers like Chromium and Firefox, while the RAT enables remote command execution on the infected system. The RAT’s capabilities include altering directories, executing scripts, and handling file operations, making it a versatile tool for cyber espionage.

Broader Implications and Campaigns

This latest development aligns with broader malicious campaigns by North Korean threat actors. A notable instance involves the dissemination of PylangGhost malware through npm packages. Additionally, the PolinRider campaign has seen malicious code inserted into multiple GitHub repositories, leading to the deployment of BeaverTail malware, another known threat attributed to the same group.

These operations have compromised several high-profile targets, including the Neutralinojs GitHub organization, highlighting the attackers’ focus on influential tech projects. The hackers have also used convincing social engineering tactics, posing as recruiters to lure victims into executing malicious code under the guise of job assessments.

Security Measures and Responses

In response to the ongoing threat, Microsoft has implemented security updates in VS Code to mitigate the risk posed by these attacks. The January 2026 update introduced a ‘task.allowAutomaticTasks’ setting to prevent automatic task execution, enhancing user protection against unintended task runs. A secondary prompt now alerts users when a new workspace contains auto-run tasks, adding another layer of security.

The United States Department of Justice has also taken legal actions against individuals involved in North Korea’s fraudulent IT worker schemes. Three men were recently sentenced for their roles in supporting these operations, shedding light on the intricate network of cyber activities designed to generate revenue and steal sensitive information.

Future Outlook and Considerations

The advancements in malware deployment techniques by North Korean hackers underscore the evolving nature of cyber threats. As these actors continuously refine their methods, organizations must remain vigilant and enhance their cybersecurity measures. The use of trusted development tools like VS Code as attack vectors highlights the need for robust security practices and user awareness to combat such sophisticated threats.

The Hacker News Tags:Contagious Interview, Cryptocurrency, Cybersecurity, GitHub, Malware, Node.js, North Korean hackers, StoatWaffle, VS Code, WaterPlum

Post navigation

Previous Post: Malvertising Campaign Exploits Tax Season with EDR Attacks
Next Post: SEO Campaign Disguises Apps to Spread AsyncRAT

Related Posts

APT28’s Webhook Malware Targets Europe APT28’s Webhook Malware Targets Europe The Hacker News
Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware The Hacker News
PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks The Hacker News
STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware The Hacker News
What AI Reveals About Web Applications— and Why It Matters What AI Reveals About Web Applications— and Why It Matters The Hacker News
Cybercrime Groups Exploit Vishing for SaaS Attacks Cybercrime Groups Exploit Vishing for SaaS Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark