AI-assisted Lazarus campaign lures developers with fake coding tests that trigger malware on open


A North Korea-linked hacking operation is targeting software developers with fake job interviews and booby-trapped coding assignments, and the campaign shows how generative AI can help attackers scale faster. Expel says the group, which it tracks as HexagonalRodent, targets Web3 developers in particular and has already exfiltrated cryptocurrency wallets worth up to $12 million over a three-month period.

The social engineering is simple and effective. Attackers pose as recruiters on platforms like LinkedIn or publish fake openings, then send a take-home coding challenge that looks legitimate. The trap sits inside the project files, where malicious configuration and source code execute once the victim opens the folder in VS Code or runs the project normally.

What makes this campaign stand out is not just the malware. Expel says the operators used tools such as ChatGPT and Cursor to help write malware, build fake company websites, and support the broader deception chain. Expel also published statements from Cursor and OpenAI confirming they reviewed or restricted abuse tied to the activity.

How the fake coding test infects developers

The main lure is a coding assessment delivered as part of a fake hiring process. Expel says the project includes a malicious tasks.json file that abuses a built-in VS Code feature. When configured with runOn: "folderOpen", the task can run the moment a developer opens the folder in VS Code, even before any visible app behavior looks suspicious.

The attackers also add malicious logic to the source code itself. That gives them a second infection path for developers who are not using VS Code, or for cases where automatic task execution has been disabled. Expel says the two delivery methods together raise the odds of compromise across different workflows.

Once inside the system, the malware chain expands. Expel says BeaverTail steals credentials from browsers, password managers, the macOS Keychain, and Linux Keyring, while OtterCookie and InvisibleFerret provide reverse-shell style remote access. The malware families are written in NodeJS and Python, which helps them blend in on developer machines that already use those runtimes every day.

Why this campaign matters

Expel says HexagonalRodent differs from some better-known DPRK groups that focus on large crypto exchanges. Instead, this operation goes after individual developers and smaller Web3 projects, where valuable wallets and credentials may exist without enterprise-grade defenses. That opportunistic model appears to be working. Expel says the group stole data from 2,726 infected systems and exposed public keys for wallets worth up to $12 million over three months.

The infostealer panel (Source – Expel)

The AI angle matters because it lowered the effort needed to run the campaign at scale. Expel says the operators used ChatGPT and Cursor, and WIRED reported that Anima was also abused to help build fake sites and infrastructure. Cursor told Expel it blocked the user and IP addresses involved, while OpenAI said it saw limited use tied to dual-use cyber topics and that its systems refused or redirected more overtly malicious requests.

Expel also tied the group to a supply chain incident involving the compromised fast-draft VSX extension, which it says distributed OtterCookie in March 2026. The company says this was the first time it had seen this group pull off a supply chain attack, a sign that the operators may be expanding beyond recruiter lures into wider distribution methods.

What security teams and developers should watch for

IndicatorWhy it matters
Unexpected coding challenge from a recruiterMain social engineering lure in the campaign
tasks.json with runOn: "folderOpen"Can trigger execution just by opening a folder in VS Code
NodeJS or Python processes with odd outbound trafficMatches the malware families Expel tracked
Fake company sites and recruiter identitiesUsed to make the job offer look real
BeaverTail, OtterCookie, InvisibleFerret activityMalware families linked to credential theft and persistence
fast-draft extension compromiseShows the group also used a supply chain route

The indicators above come from Expel’s April 22 report on HexagonalRodent and the campaign’s infection chain.

What developers should do now

  • Never run a take-home assessment from an unknown or unverified recruiter without reviewing every file first, including hidden configuration files.
  • Disable or tightly control automatic task execution in VS Code so opening a folder does not silently trigger commands.
  • Treat unexpected NodeJS and Python processes with persistent outbound connections as suspicious on developer systems.
  • Use hardware security keys or hardware wallets for crypto assets. Expel says hardware-backed protection made wallet theft harder for the attackers.
  • Verify recruiters and employers through official channels before opening any project files or assessment packages.

FAQ

Is this really linked to Lazarus?

Expel says it assesses with high confidence that HexagonalRodent is North Korean state-sponsored. It also says the group is likely a subgroup or spin-off within the broader DPRK ecosystem, with medium-high confidence that it is a subset of what CrowdStrike calls Famous Chollima.

How does the VS Code trick work?

The project includes a malicious tasks.json file configured to run on folder open. That means the malware can execute when the victim simply opens the project in VS Code.

What does the malware steal?

Expel says BeaverTail can steal credentials from browsers, password managers, macOS Keychain, and Linux Keyring, while OtterCookie and InvisibleFerret provide remote access.

Did AI create new capabilities here?

OpenAI said it did not identify novel capabilities in the interactions it could see. The value, based on public reporting and Expel’s findings, appears to be speed, scale, and easier infrastructure building rather than a brand-new offensive technique.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages