Microsoft Warns Developers: Malicious Next.js Repos Enable Hacker Remote Access


Hackers target software developers with fake Next.js repositories disguised as job assessments. These poisoned projects trick users into running code that connects to attacker servers. Once active, they grant remote access to machines holding sensitive data like source code and API keys. Microsoft Defender researchers detailed this campaign in their official blog post on February 24, 2026. “We observed Node.js processes on developer endpoints making repeated outbound connections to known command-and-control infrastructure,” the Microsoft Security Blog states. 

Attackers use job lures on platforms like GitHub and Bitbucket. They name repos to mimic legit projects, such as “Cryptan-Platform-MVP1” or technical tests. Developers clone and execute them during routine work. This leads to silent infections. The threat blends into daily workflows, making detection hard.

Microsoft traced the attacks via network telemetry. Suspicious Node.js traffic pointed to shared code patterns across repo families. These include “Cryptan,” “JP-soccer,” “RoyalJapan,” and “SettleMint” variants like v1, master, and demo. Analysts pivoted on loader logic to uncover more. No updates emerged as of February 26, 2026; 

Developer machines carry high risks. They store cloud keys, build secrets, and pipelines. One breach can chain to full infrastructure compromise. This marks a supply chain shift. Attackers hide malware in trusted tools like Next.js.

Telemetry showing a VS Code-adjacent Node script initiating outbound access to a Vercel staging endpoint (Source – Microsoft)
Telemetry showing node server – server.js reaching out to a Vercel-hosted staging endpoint (Source – Microsoft)

Attack Entry Points

Malicious repos use three paths to deploy payloads. All fetch JavaScript from Vercel, then poll C2 servers.

  • VS Code Automation: .vscode/tasks.json sets “runOn: folderOpen”. Opening the folder triggers a Node script to grab the loader.
  • NPM Dev Server: “npm run dev” runs trojanized jquery.min.js. It decodes a base64 URL for the Vercel loader.
  • Backend Startup: .env hides a base64 endpoint. Server boot sends env vars (keys, tokens) to attackers, then compiles JS payload.

Stage 1 profiles the host and beacons. Stage 2 enables file theft, browsing, and uploads.

Stage 1 registrar payload retrieved at runtime and executed by Node.js (Source – Microsoft)
Stage 2 staged upload workflow observed in telemetry (Source – Microsoft)

Key Indicators of Compromise

Monitor these for quick detection.

IndicatorDescriptionExample
NetworkNode.js to Vercel/C2 IPsCheck DeviceNetworkEvents for vercel.app domains
ProcessesUnexpected npm/Node tasksVS Code tasks.json with folderOpen
FilesBase64 in .env or JSjquery.min.js decoding URLs
BehaviorsEnv var exfil on bootAPI keys sent pre-execution

Source: Microsoft Defender telemetry.

Mitigation Steps

Protect teams now.

  • Enable VS Code Workspace Trust and Restricted Mode.
  • Block untrusted code with Attack Surface Reduction rules.
  • Scan Node.js outbound traffic via DeviceProcessEvents.
  • Ban prod creds on dev machines; use vaults.
  • Train on repo vetting: Verify owners, stars, forks.

Organizations should enforce MFA and conditional access for devs.

FAQ

What triggers the malware?

Cloning and running fake Next.js repos via VS Code open, npm dev, or server start.

Which platforms host these repos?

GitHub, Bitbucket; search for “Cryptan,” “JP-soccer,” etc.

How does Microsoft recommend hunting?

Use DeviceNetworkEvents for Node.js to C2; triage via identity risks.

Is there a patch?

No software patch; focus on behaviors and monitoring. 

Who is at risk?

Developers in job hunts or assessments; corporate teams with source access.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages