North Korean Groups Deploy Poisoned Next.js Repositories
North Korean threat actors have weaponized Next.js repositories as part of sophisticated fake job recruitment campaigns targeting software developers. The malicious repositories appear legitimate but contain hidden payloads designed to compromise developer workstations.
The campaign leverages the popularity of Next.js, a widely-used React framework, to trick developers into downloading and executing malicious code during what appears to be a standard technical interview process.
Developers and Engineering Teams at Risk
The campaign specifically targets software developers, particularly those working with JavaScript frameworks and modern web development stacks. Developers who engage with unsolicited job opportunities or participate in coding challenges from unknown recruiters face the highest risk.
The attack method exploits developers' familiarity with Next.js and their willingness to download and test code repositories as part of technical assessments.
Related: APT41-Linked Silver Dragon Hits EU and Asian Governments
Related: ClickFix Campaign Exploits Windows Terminal for Lumma
Related: Security Executive Hit by Multi-Vector Phishing Campaign
Related: Salesforce Mass-Scanning Attack: Hackers Exploit
Related: Russian hackers target Signal, WhatsApp in govt phishing
Persistent Access Through Development Workflows
The malicious repositories establish persistent access to infected developer machines, allowing attackers to maintain long-term presence in compromised environments. This access can potentially lead to broader network infiltration and intellectual property theft.
Developers should verify the legitimacy of job opportunities and avoid downloading code from unverified sources. Organizations should implement code review processes for any external repositories used in hiring assessments.




