Posted in

Fake Job Interview Malware: Void Dokkaebi Attack Explained

A simple job interview could be all it takes to compromise your entire development environment.

In a sophisticated campaign, the North Korea-linked threat group Void Dokkaebi is targeting developers with fake job interviews, tricking them into running malicious code disguised as technical assessments. What starts as a routine coding test quickly turns into a supply chain attack, infecting repositories and spreading malware across teams and organizations.

This blog explains how the attack works, why it’s uniquely dangerous, and how developers and security teams can defend against it.


What Is Fake Job Interview Malware?

Fake job interview malware is a social engineering attack targeting developers, where attackers pose as recruiters and distribute malicious code through seemingly legitimate repositories.

Key Threat Actor: Void Dokkaebi (Famous Chollima)

  • Linked to North Korean cyber operations
  • Focuses on crypto, AI, and developer ecosystems
  • Uses trusted platforms like GitHub, GitLab, Bitbucket

Why Developers Are Targeted

  • High-value access to source code and infrastructure
  • Ability to unintentionally spread malware via repositories
  • Trust in collaborative coding environments

How the Attack Works

Step-by-Step Attack Chain

  1. Initial Contact
    • Developer is approached on LinkedIn or similar platforms
    • Attacker poses as a recruiter
  2. Fake Technical Interview
    • Candidate is asked to complete a coding task
    • Provided with a repository link
  3. Repository Cloning
    • Repo appears legitimate
    • Contains hidden malicious code
  4. Execution Trigger
    • Opening the project triggers malware
    • Often through VS Code configuration files
  5. System Compromise
    • Remote access trojan (RAT) is installed
    • Attacker gains control of the machine
  6. Worm-Like Propagation
    • Malware spreads through the victim’s repositories
    • Infects other developers automatically

Inside the Infection Chain

1. VS Code Task Abuse

Attackers exploit a hidden file:

  • .vscode/tasks.json

How it works:

  • Executes automatically when the project opens
  • Requires minimal user interaction
  • Downloads or runs malicious payloads

2. Repository Poisoning

Once inside:

  • JavaScript is injected into source files
  • Malicious code is hidden using whitespace
  • Hard to detect during code review

3. Commit Tampering

A script called:

  • temp_auto_push.bat

Performs:

  • Rewriting commit history
  • Preserving author name and timestamps
  • Force-pushing malicious changes

Result:
Malicious commits appear legitimate.


4. Payload: DEVSPOPPER RAT

A cross-platform Node.js-based remote access trojan:

  • Communicates via WebSocket
  • Uses HTTP for data exfiltration
  • Supports multiple attacker sessions

Evasion Techniques

  • Detects CI/CD environments
  • Avoids sandbox execution
  • Runs only on real developer machines

Real-World Impact and Scale

By March 2026:

  • 750+ infected repositories
  • 500+ malicious VS Code task configs
  • 100+ commit tampering instances

Even trusted projects were affected:

  • DataStax
  • Neutralinojs

Why This Is a Supply Chain Nightmare

  • Malware spreads through legitimate commits
  • Developers unknowingly infect others
  • Traditional security tools often miss it

Why This Attack Is So Dangerous

1. Trust Exploitation

Developers trust:

  • Code repositories
  • Recruiters
  • Open-source contributions

2. Self-Propagating Mechanism

  • No need for repeated phishing
  • Infection spreads automatically

3. CI/CD Blind Spots

  • Malware avoids pipelines
  • Evades automated scanning tools

4. Persistent Access

  • Attackers maintain long-term control
  • Multiple operators per infected system

Common Mistakes Developers Make

❌ Running Interview Code Locally

Never execute untrusted code on your main machine.

❌ Ignoring VS Code Prompts

Workspace trust prompts can trigger malicious tasks.

❌ Weak Git Controls

Unsigned commits allow tampering to go unnoticed.


Best Practices to Prevent This Attack

For Developers

  • Use isolated environments (VMs/containers) for tests
  • Never run interview code on personal machines
  • Inspect .vscode/ configurations before opening projects

For Organizations

1. Enforce Secure Git Policies

  • Require GPG or SSH-signed commits
  • Enable branch protection rules
  • Mandate pull request reviews

2. Block VS Code Exploits

  • Add .vscode/ to .gitignore
  • Prevent execution of untrusted tasks

3. Monitor Developer Workstations


4. Threat Hunting Indicators

Look for:

  • global′!′′!′
  • global’_V’
  • temp_auto_push.bat

Network-Level Monitoring

Watch for connections to:

  • Blockchain APIs (e.g., TronGrid)
  • Binance Smart Chain endpoints

Frameworks and Standards Alignment

NIST Cybersecurity Framework

  • Identify: Developer endpoint risks
  • Protect: Secure coding environments
  • Detect: Monitor unusual repo activity
  • Respond: Contain compromised systems
  • Recover: Restore clean codebases

MITRE ATT&CK Mapping

TacticTechnique
Initial AccessSpearphishing via recruitment
ExecutionMalicious scripts (VS Code tasks)
PersistenceCode injection in repositories
Defense EvasionCommit tampering
Command & ControlWebSocket-based RAT

Tools to Strengthen Defense

  • Endpoint Detection & Response (EDR)
  • Secure code scanning tools
  • Git security platforms
  • DevSecOps pipelines
  • Threat intelligence feeds

FAQs: Fake Job Interview Malware

1. What is fake job interview malware?

It’s a social engineering attack where developers are tricked into running malicious code during fake interviews.

2. Who is behind this campaign?

The threat group Void Dokkaebi, linked to North Korea.

3. How does the malware spread?

Through infected repositories and compromised developer accounts.

4. What is DEVSPOPPER?

A Node.js-based remote access trojan used to control infected machines.

5. Why doesn’t CI/CD detect it?

The malware avoids running in automated environments and targets real machines.

6. How can developers stay safe?

Use isolated environments, verify code, and enforce secure Git practices.


Conclusion

The Void Dokkaebi fake job interview campaign highlights a dangerous evolution in cyber threats—where developer workflows themselves become the attack vector.

By combining social engineering, supply chain compromise, and stealthy malware propagation, attackers can scale infections across entire ecosystems.

Key takeaway:

Never run untrusted code—especially during job interviews.

Organizations must adopt DevSecOps best practices, enforce repository security, and prioritize endpoint protection for developers.

Now is the time to audit your development workflows and secure your software supply chain.

Leave a Reply

Your email address will not be published. Required fields are marked *