{"id":43953,"date":"2026-02-26T06:39:29","date_gmt":"2026-02-25T22:39:29","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/26\/fake-next-js-job-interview-tests-backdoor-developers-devices\/"},"modified":"2026-02-26T06:39:29","modified_gmt":"2026-02-25T22:39:29","slug":"fake-next-js-job-interview-tests-backdoor-developers-devices","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/26\/fake-next-js-job-interview-tests-backdoor-developers-devices\/","title":{"rendered":"Fake Next.js job interview tests backdoor developer&#8217;s devices"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2025\/11\/05\/Credit-card-hacker.jpg\" width=\"1600\" alt=\"Fake Next.js job interview tests backdoor developer's devices\"><\/p>\n<p>A coordinated campaign targeting software developers with job-themed lures is using malicious&nbsp;repositories posing as legitimate Next.js projects and technical assessment materials, including recruiting coding tests.<\/p>\n<p>The attacker&#8217;s goal is to achieve remote code execution (RCE) on developer machines, exfiltrate sensitive data, and introduce additional payloads on compromised systems.<\/p>\n<h4>Multiple execution triggers<\/h4>\n<p>Next.js is a popular JavaScript framework used for building web applications. It runs on top of React and uses Node.js for the backend.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.wiz.io\/lp\/ai-security-board-report-template?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q4_INB_FORM_AI-Security-Board-Report-Template&amp;sfcid=701Vh00000Wn7E1IAJ&amp;utm_term=FY27-bleepingcomputer-article-970x250&amp;utm_content=AI-Board-Report\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/w\/ai-security-board-report-template.jpg\" style=\"margin-top: 0px;\" alt=\"Fake Next.js job interview tests backdoor developer's devices\"><\/a> <\/div>\n<p>The Microsoft Defender team says that&nbsp;the attacker&nbsp;created fake web app projects built with Next.js and disguised them as coding projects to share with developers during job interviews or technical assessments.<\/p>\n<p>The researchers initially identified a repository hosted on the Bitbucket&nbsp;cloud-based Git-based code hosting and collaboration service. However, they discovered multiple repositories that shared code structure, loader logic, and naming patterns.<\/p>\n<p>When the target clones the repository and opens it locally, following a standard workflow, they trigger malicious JavaScript that executes automatically when launching the app.<\/p>\n<p>The script downloads additional malicious code (a JavaScript backdoor) from the attacker&#8217;s server&nbsp;and executes it directly in memory with the&nbsp;running Node.js process, allowing remote code execution on the machine.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"600\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/February\/attack-chain(2).jpg\" width=\"865\" alt=\"Fake Next.js job interview tests backdoor developer's devices\"><figcaption><strong>Overview of the attack chain<\/strong><br \/><em>Source: Microsoft<\/em><\/figcaption><\/figure>\n<\/div>\n<p>To increase the infection rate, the attackers embedded multiple execution triggers within the malicious repositories, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/02\/24\/c2-developer-targeting-campaign\/\" target=\"_blank\" rel=\"nofollow noopener\">Microsoft explained<\/a>. These are summarized as follows:<\/p>\n<ol>\n<li><strong>VS Code trigger <\/strong>&ndash; A .vscode\/tasks.json file set with runOn: &#8220;folderOpen&#8221; executes a Node script as soon as the project folder is opened (and trusted).<\/li>\n<li><strong>Dev server trigger <\/strong>&ndash; When the developer runs npm run dev, a trojanized asset (e.g., a modified JS library) decodes a hidden URL, fetches a loader from a remote server, and executes it in memory.<\/li>\n<li><strong>Backend startup trigger <\/strong>&ndash; On server start, a backend module decodes a base64 endpoint from .env, sends process.env to the attacker, receives JavaScript in response, and executes it using new Function().<\/li>\n<\/ol>\n<p>The infection process drops a JavaScript payload (Stage 1) that profiles the host and registers with a command-and-control (C2) endpoint, polling the server at fixed intervals.<\/p>\n<p>The infection then upgrades to a tasking controller (Stage 2) that connects to a separate C2 server, checks&nbsp;for tasks, executes supplied JavaScript in memory, and tracks spawned processes. The payload also supports file enumeration, directory browsing, and staged file exfiltration.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"591\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-nextjs-job-interview-tests-backdoor-developers-devices\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" width=\"564\" data-src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/February\/polling.jpg\" alt=\"Fake Next.js job interview tests backdoor developer's devices\"><figcaption><strong>Stage 2&#8217;s server polling function<\/strong><br \/><em>Source: Microsoft<\/em><\/figcaption><\/figure>\n<\/div>\n<p>Microsoft found that the campaign involved multiple repositories that shared naming conventions, loader structure, and staging infrastructure, indicating a coordinated effort rather than a one-off attack.<\/p>\n<p>Aside from the technical analysis, the researchers did not provide any details about the attacker or the extent of the operation.&nbsp;<\/p>\n<p>The tech giant advises that developers should treat standard workflows as the high-risk attack surfaces they really are and take appropriate precautions.<\/p>\n<p>The recommended mitigations include enforcing VS Code Workspace Trust\/Restricted Mode, using Attack Surface Reduction (ASR) rules, and monitoring risky sign-ins with Entra ID Protection.<\/p>\n<p>Secrets stored on developer endpoints should be minimized, and short-lived tokens with the least required privileges should be used where possible.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-nextjs-job-interview-tests-backdoor-developers-devices\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/t\/tines-in-art-square.jpg\" alt=\"Fake Next.js job interview tests backdoor developer's devices\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">The future of IT infrastructure is here<\/a><\/h2>\n<p>Modern IT infrastructure moves faster than manual workflows can handle.<\/p>\n<p>In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.<\/p>\n<p>          <button><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">Get the guide<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/malicious-ai-extensions-on-vscode-marketplace-steal-developer-data\/\">Malicious AI extensions on VSCode Marketplace steal developer data<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/windows-11-kb5077241-update-improves-bitlocker-adds-sysmon-tool\/\">Windows 11 KB5077241 update improves BitLocker, adds Sysmon tool<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/windows-11-kb5074105-update-fixes-boot-sign-in-and-activation-issues\/\">Windows 11 KB5074105 update fixes boot, sign-in, and activation issues<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-adds-copilot-data-controls-to-all-storage-locations\/\">Microsoft adds Copilot data controls to all storage locations<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/spain-arrests-suspected-anonymous-fenix-hacktivists-for-ddosing-govt-sites\/\">Spain arrests suspected hacktivists for DDoSing govt sites<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A coordinated campaign targeting software developers wi [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-43953","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43953"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43953\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43953"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}