Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Next.js Repositories Targeting Developers

Hackers Exploit Next.js Repositories Targeting Developers

Posted on February 25, 2026 By CWS

Software developers are facing a coordinated attack campaign using malicious repositories masked as legitimate Next.js projects and assessment materials. These attacks aim to infiltrate developer systems through job-related lures, enticing developers to clone and execute compromised code.

Deceptive Tactics and Remote Access

Hackers use fake recruitment challenges to trick developers into running harmful code that establishes a connection to attacker-controlled command-and-control (C2) infrastructure. This grants unauthorized access to the developer’s system and sensitive data.

The initial detection of this campaign came from unusual outbound network connections from Node.js processes on compromised developer devices. These processes pointed to known C2 IP addresses, prompting further investigation into the execution chains.

Identifying Malicious Repositories

Microsoft Defender Experts and the Microsoft Defender Security Research Team uncovered a broader network of related repositories. They identified clusters such as ‘Cryptan,’ ‘JP-soccer,’ ‘RoyalJapan,’ and ‘SettleMint,’ which shared code structures and naming patterns, aiding in tracing additional malicious repositories.

This attack poses particular risks to corporate development teams. Developer systems often have access to valuable assets like source code, cloud API keys, and database credentials. A single breach could expose an organization’s entire infrastructure.

Execution Paths and Preventative Measures

The campaign exploits three primary execution paths, all leading to the execution of attacker-controlled JavaScript. The first path abuses Visual Studio Code workspace automation, while the second path exploits npm server commands. The third path uses server startup scripts to transmit sensitive data and execute malicious JavaScript.

To mitigate these threats, developers should enable Visual Studio Code Workspace Trust and Restricted Mode. Organizations are advised to enforce attack surface reduction rules and implement strong authentication for developer accounts. Monitoring unusual Node.js connections is also recommended to detect potential compromises.

As attackers increasingly blend malicious code into routine workflows, this campaign highlights the evolving nature of software supply chain threats. Organizations must remain vigilant and proactive in securing their development environments.

Cyber Security News Tags:code execution, Cybersecurity, developer security, hacker attacks, malicious repositories, Microsoft Defender, Next.js, remote access, software development, software supply chain

Post navigation

Previous Post: Optimizely Suffers Cyberattack Through Vishing Tactics
Next Post: SolarWinds Fixes Major Flaws in Serv-U Software

Related Posts

Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems Cyber Security News
Hive0156 Hackers Attacking Government and Military Organizations to Deploy Remcos RAT Hive0156 Hackers Attacking Government and Military Organizations to Deploy Remcos RAT Cyber Security News
Scanner Tool to Detect WhisperPair Flaw in Google’s Fast Pair Protocol Scanner Tool to Detect WhisperPair Flaw in Google’s Fast Pair Protocol Cyber Security News
Amazon EKS Vulnerabilities Exposes Sensitive AWS Credentials and Escalate Privileges Amazon EKS Vulnerabilities Exposes Sensitive AWS Credentials and Escalate Privileges Cyber Security News
Threat Actors Manipulating LLMs for Automated Vulnerability Exploitation Threat Actors Manipulating LLMs for Automated Vulnerability Exploitation Cyber Security News
Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hacker Exploits AI to Breach Mexican Government Systems
  • Critical Cisco Vulnerability Exposes SD-WAN to Attacks
  • SURXRAT Android Malware Threatens Global Device Security
  • Cortex XDR Vulnerability Enables Covert Command Channels
  • Cybercriminals Exploit Fake Avast Site for Credit Card Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hacker Exploits AI to Breach Mexican Government Systems
  • Critical Cisco Vulnerability Exposes SD-WAN to Attacks
  • SURXRAT Android Malware Threatens Global Device Security
  • Cortex XDR Vulnerability Enables Covert Command Channels
  • Cybercriminals Exploit Fake Avast Site for Credit Card Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News