Skip to main content
Mallory

North Korea-linked Social Engineering Campaigns Targeting Developers and Defense Supply Chains

state-sponsored-espionagephishing-campaign-intelligencegovernment-diplomatic-threatcredential-stealer-activitycommand-and-control-method
Updated March 21, 2026 at 02:45 PM4 sources
Share:
North Korea-linked Social Engineering Campaigns Targeting Developers and Defense Supply Chains

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

North Korea–aligned operators, including Lazarus (aka HIDDEN COBRA), are running multiple social-engineering-led intrusion campaigns aimed at stealing sensitive technology and establishing durable access. Reporting on Operation DreamJob describes fake job-offer lures used to compromise European drone manufacturers and defense contractors, with tooling and infrastructure designed to evade traditional defenses and support cyber-espionage against UAV-related intellectual property. Separately, a developer-focused operation dubbed “Fake Font” uses fake recruiter outreach and malicious GitHub repositories to trick engineers into opening projects that abuse Visual Studio Code automation (via .vscode/tasks.json) and disguised payloads (e.g., .woff2 “font” files) to execute multi-stage malware that ultimately deploys the InvisibleFerret Python backdoor for credential and crypto-wallet theft and long-term access.

A distinct DPRK-linked campaign reported by Darktrace targets South Korean users with spear-phishing that delivers a JSE script masquerading as an HWPX document and then abuses VS Code tunnels as a covert C2 channel over trusted Microsoft infrastructure, complicating detection in developer-heavy environments. Other items in the set describe unrelated activity: phishing abuse of Vercel to deliver remote-access tooling, exploitation of CVE-2025-51683 (blind SQLi) in the Mjobtime time-tracking app to reach MSSQL xp_cmdshell, a hospitality-focused DCRat campaign using ClickFix and MSBuild.exe, a generic CSS exfiltration technique write-up, and Trend Micro research on the PeckBirdy LOLBins framework used by China-aligned intrusion sets—none of which are part of the DPRK developer/defense recruitment-themed operations above.

Timeline

  1. Jan 26, 2026

    Darktrace identifies VS Code tunnel espionage targeting South Koreans

    Darktrace reported a DPRK-linked cyberespionage campaign targeting South Korean users with spear-phishing emails delivering a JSE file disguised as an HWPX document. After execution, the malware established a Visual Studio Code tunnel through Microsoft infrastructure and used a compromised legitimate website to broker remote access.

  2. Oct 18, 2025

    DPRK 'Fake Font' developer campaign begins

    Lazarus Group launched a developer-focused campaign dubbed 'Fake Font' more than 100 days before late January 2026, using fake LinkedIn recruiters and malicious GitHub coding assessments. The repositories abused Visual Studio Code task automation and disguised JavaScript malware as .woff2 font files to deploy the InvisibleFerret backdoor.

  3. Mar 25, 2025

    Operation DreamJob targets European drone and defense firms

    In late March 2025, Lazarus Group began a renewed Operation DreamJob cyberespionage campaign against European drone manufacturers and defense contractors, using fake job offers and trojanized documents to steal UAV-related intellectual property. Researchers later confirmed at least three targeted companies in Central and Southeastern Europe.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

North Korean Contagious Interview Campaign Uses Malicious VS Code Projects

North Korean Contagious Interview Campaign Uses Malicious VS Code Projects

North Korea-linked threat actors tied to the long-running **Contagious Interview** operation have been observed using **malicious Microsoft Visual Studio Code (VS Code) projects** as part of fake job-assessment lures, instructing targets to clone repositories from GitHub/GitLab/Bitbucket and open them in VS Code. The technique abuses VS Code `tasks.json` configuration—specifically `"runOn": "folderOpen"`—to trigger execution when a folder is opened, pulling staged payloads from attacker-controlled infrastructure (including Vercel-hosted domains) and ultimately deploying backdoors such as **BeaverTail** and **InvisibleFerret** that enable remote code execution and follow-on control. Recent iterations reportedly add multi-stage droppers embedded in task configuration content and disguised as benign files (e.g., spell-check dictionaries) to improve resilience if network retrieval fails, and include command-and-control behavior that can execute attacker-supplied JavaScript from a remote server (e.g., `ip-regions-check.vercel[.]app`). Separate reporting on North Korean APT trends indicates continued reliance on **fraudulent IT employment schemes** and recruitment-platform abuse to gain access to Western organizations, including long-term social engineering and persistent remote access via legitimate tools (e.g., *AnyDesk*, *Google Remote Desktop*) and VPN/location obfuscation. This broader pattern aligns with the same overarching tradecraft used in developer-targeted “interview” lures: leveraging hiring workflows and developer tooling to establish initial access and persistence while reducing suspicion, particularly in environments with remote-work infrastructure and developer workstations.

1 months ago
North Korea-Linked Threat Activity and Reporting on Lazarus, IT Worker Schemes, and Related Malware

North Korea-Linked Threat Activity and Reporting on Lazarus, IT Worker Schemes, and Related Malware

Multiple reports and threat-intel posts highlighted **North Korea-linked cyber activity** spanning social engineering, malware, and broader ecosystem analysis. AllSecure described an attempted compromise of a CEO via a **fake LinkedIn job interview** attributed to **Lazarus** tradecraft (tagged *BeaverTail* / *Contagious Interview*), indicating continued use of recruiter-style lures and developer tooling themes (e.g., *VSCode*) to gain execution on target systems. Separately, eSentire published technical analysis on the **DEV#POPPER remote access trojan** and associated **OmniStealer** activity, framing it as DPRK-linked malware and providing defensive guidance for organizations facing this threat class. Additional DPRK-focused intelligence covered both strategic and operational dimensions. Google’s *Cloud Threat Horizons Report H1 2026* discussed cloud-focused threat activity and tracked DPRK-linked clusters (including **UNC4899** and **UNC5267**), while Logpresso published an OSINT report on **DPRK remote IT worker** infiltration tactics (fraudulent employment/contractor placement). NKInternet released a catalog-style overview of **North Korea’s software export ecosystem**, and RedAsgard’s “Hunting Lazarus” series contributed hands-on investigative detail into Lazarus operator artifacts. A separate Lazarus threat-actor profile page aggregated historical reporting and statistics, but did not add a discrete new incident beyond compilation.

5 days ago
North Korean Recruiter Scam Delivers BeaverTail and InvisibleFerret Malware

North Korean Recruiter Scam Delivers BeaverTail and InvisibleFerret Malware

North Korean threat actors have been linked to **Operation Contagious Interview**, a campaign that impersonates job recruiters to target software developers with malware-laced interview workflows. Palo Alto Networks Unit 42 said the operation uses fake hiring outreach, GitHub-hosted projects, and rogue `npm` packages to deliver **BeaverTail** and **InvisibleFerret**, two cross-platform malware families aimed at stealing data and establishing persistent access. BeaverTail acts as both an infostealer and loader, while InvisibleFerret is a Python backdoor capable of host fingerprinting, remote control, keylogging, data exfiltration, and deploying remote administration tools such as AnyDesk. The activity has been tracked as a distinct North Korean subgroup under the **Contagious Interview** name, although researchers noted tactical overlap with the broader **Operation Dream Job** playbook. The same reporting also tied Pyongyang-linked operators to **Wagemole**, a parallel scheme in which forged identities are used to secure jobs at foreign companies for revenue generation and espionage, reinforcing government warnings that North Korea is abusing developer ecosystems such as **GitHub**, `npm`, and `PyPI` to evade sanctions and support state objectives.

Yesterday

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.