Fake Next.js job interview tests backdoor developer's devices
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我得仔细阅读这篇文章,理解它的主要信息。 文章讲的是一个针对软件开发者的恶意活动。攻击者创建了伪装成合法Next.js项目的恶意仓库,这些仓库看起来像是在招聘过程中的技术评估材料。当开发者克隆这些仓库并运行项目时,恶意脚本会被触发,下载后门程序,从而实现远程代码执行,窃取敏感数据,并植入更多恶意负载。 攻击者用了多种触发机制来提高感染率,比如在VS Code中打开项目文件夹时触发、运行开发服务器时触发以及启动后端服务时触发。微软的安全团队分析了这个攻击链,并给出了防护建议,比如启用Workspace Trust、使用ASR规则和监控可疑登录等。 所以,总结的时候需要涵盖攻击目标、方法、触发机制以及建议措施。控制在100字以内的话,可能需要精简语言,去掉一些细节。 最后的总结应该清晰明了,直接描述文章内容。比如:“攻击者利用伪装的Next.js项目和恶意代码库针对开发者,在技术评估或面试中传播。通过多种触发机制实现远程代码执行和数据窃取。”这样既涵盖了主要点,又符合字数限制。 </think> 攻击者利用伪装的Next.js项目和恶意代码库针对开发者,在技术评估或面试中传播。通过多种触发机制实现远程代码执行和数据窃取。 2026-2-25 22:0:37 Author: www.bleepingcomputer.com(查看原文) 阅读量:6 收藏

Fake Next.js job interview tests backdoor developer's devices

A coordinated campaign targeting software developers with job-themed lures is using malicious repositories posing as legitimate Next.js projects and technical assessment materials, including recruiting coding tests.

The attacker's goal is to achieve remote code execution (RCE) on developer machines, exfiltrate sensitive data, and introduce additional payloads on compromised systems.

Multiple execution triggers

Next.js is a popular JavaScript framework used for building web applications. It runs on top of React and uses Node.js for the backend.

Wiz

The Microsoft Defender team says that the attacker created fake web app projects built with Next.js and disguised them as coding projects to share with developers during job interviews or technical assessments.

The researchers initially identified a repository hosted on the Bitbucket cloud-based Git-based code hosting and collaboration service. However, they discovered multiple repositories that shared code structure, loader logic, and naming patterns.

When the target clones the repository and opens it locally, following a standard workflow, they trigger malicious JavaScript that executes automatically when launching the app.

The script downloads additional malicious code (a JavaScript backdoor) from the attacker's server and executes it directly in memory with the running Node.js process, allowing remote code execution on the machine.

Overview of the attack chain
Overview of the attack chain
Source: Microsoft

To increase the infection rate, the attackers embedded multiple execution triggers within the malicious repositories, Microsoft explained. These are summarized as follows:

  1. VS Code trigger – A .vscode/tasks.json file set with runOn: "folderOpen" executes a Node script as soon as the project folder is opened (and trusted).
  2. Dev server trigger – When the developer runs npm run dev, a trojanized asset (e.g., a modified JS library) decodes a hidden URL, fetches a loader from a remote server, and executes it in memory.
  3. Backend startup trigger – On server start, a backend module decodes a base64 endpoint from .env, sends process.env to the attacker, receives JavaScript in response, and executes it using new Function().

The infection process drops a JavaScript payload (Stage 1) that profiles the host and registers with a command-and-control (C2) endpoint, polling the server at fixed intervals.

The infection then upgrades to a tasking controller (Stage 2) that connects to a separate C2 server, checks for tasks, executes supplied JavaScript in memory, and tracks spawned processes. The payload also supports file enumeration, directory browsing, and staged file exfiltration.

Stage 2
Stage 2's server polling function
Source: Microsoft

Microsoft found that the campaign involved multiple repositories that shared naming conventions, loader structure, and staging infrastructure, indicating a coordinated effort rather than a one-off attack.

Aside from the technical analysis, the researchers did not provide any details about the attacker or the extent of the operation. 

The tech giant advises that developers should treat standard workflows as the high-risk attack surfaces they really are and take appropriate precautions.

The recommended mitigations include enforcing VS Code Workspace Trust/Restricted Mode, using Attack Surface Reduction (ASR) rules, and monitoring risky sign-ins with Entra ID Protection.

Secrets stored on developer endpoints should be minimized, and short-lived tokens with the least required privileges should be used where possible.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/fake-nextjs-job-interview-tests-backdoor-developers-devices/
如有侵权请联系:admin#unsafe.sh