HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

North Korean APT Team 8 Leverages VS Code Auto‑Run Tasks to Deploy StoatWaffle Malware

Team 8, a North Korea‑linked threat group, is abusing Visual Studio Code’s auto‑run tasks to silently install the multi‑stage StoatWaffle malware, stealing credentials and providing remote access across Windows, macOS, and Linux environments. The technique expands the attack surface for any organization that permits developers to open untrusted VS Code projects.

🛡️ LiveThreat™ Intelligence · 📅 March 24, 2026· 📰 securityaffairs.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
4 recommended
📰
Source
securityaffairs.com

North Korean APT Team 8 Leverages VS Code Auto‑Run Tasks to Deploy StoatWaffle Malware

What Happened — Team 8, a North Korea‑linked APT, has been abusing the tasks.json auto‑run feature in Microsoft Visual Studio Code projects to silently download and execute the StoatWaffle malware suite. The malicious repositories appear legitimate (often posing as blockchain‑related projects) and trigger payloads whenever a folder is opened in VS Code.

Why It Matters for TPRM

  • The technique runs inside a trusted developer tool, evading many endpoint protections.
  • It can compromise Windows, macOS, and Linux workstations, stealing browser credentials, extension data, and macOS Keychain entries.
  • Supply‑chain infection via public code repositories expands the attack surface for any organization that allows developers to pull external VS Code projects.

Who Is Affected — Software development teams, SaaS platforms hosting code repositories, and any enterprise that permits VS Code usage on employee workstations.

Recommended Actions

  • Disable or tightly control VS Code’s auto‑run tasks; require manual review of .vscode/tasks.json files from untrusted sources.
  • Enforce application‑allowlisting for VS Code and Node.js runtimes.
  • Deploy monitoring for anomalous outbound traffic to known C2 domains and for credential‑theft indicators on developer machines.
  • Conduct security awareness training focused on the risks of opening unverified VS Code projects.

Technical Notes — The attacker places a malicious tasks.json that launches a downloader from Vercel, installs Node.js if missing, and runs a multi‑stage loader. Modules include a credential stealer (browsers, extensions, macOS Keychain, WSL) and a RAT for remote command execution. Source: Security Affairs

📰 Original Source
https://securityaffairs.com/189880/security/north-korea-linked-threat-actors-abuse-vs-code-auto-run-to-spread-stoatwaffle-malware.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.