A new intelligence report has again put on the table a persistent and sophisticated threat that combines social engineering, abuse of development tools and holdings in the software supply chain. According to data shared by Recorded Future, an operation tracked under the appeal PurpleBravo would have pointed to thousands of IP addresses and dozens of companies on multiple continents, using false job offers and committed development projects like lures to deploy malware.
The findings describe that 3.136 individual IP addresses were linked to potential objectives of this activity between August 2024 and September 2025, and that the campaign claimed to have targeted a dozen organizations in sectors ranging from artificial intelligence and cryptomonedas to financial services, marketing and software development. The identified victims are distributed by countries such as Belgium, India, Italy, Pakistan, Romania, United Arab Emirates and Vietnam, which highlights the transnational scope of the actor.

The relevance of this operation is not only the amount of machines potentially affected, but the tactic used: false profiles in professional networks and malicious repositories that pass through legitimate projects of Visual Studio Code or GitHub. Investigations of security signatures, including publications of Jamf Threat Labs, have shown how attackers insert backdoors and loaders into packages that developers could clone and run by trusting that they come from reliable sources. In this way, the development standard workflows are used to introduce malware without the need for traditional vulnerabilities.
The campaign-related malware families include information thieves and back doors written in different languages, including a JavaScript infostealer known as BeaverTail and a back door developed in Go - nicknamed GolangGhost or similar variants - that reuses open source tool components to steal credentials and exfilter data. The associated command and control servers (C2) were housed in multiple suppliers and managed through the VPN Astrill, an infrastructure pattern that has already been observed in malicious activities attributed to North Korean actors.
In addition to the distribution of malware through repositories, the operation has combined false recruitment with code tests: candidates contacted by the attackers performed technical exercises on corporate devices, which in many cases involved the execution of malicious code on the contracting company's teams. The side effect is evident: the risk is no longer limited to the individual receiving the offer, but extends to customers and partners of the affected organization, creating a vector of commitments in the software supply chain.
This way of operating complements another line of activity known for years: the insertion of North Korean computer workers under false identities to access organizations abroad, for both espionage and profit purposes. Although the two fronts - fraudulent jobs and committed software supply campaigns - are dealt with separately, research points to important overlap in tactics, infrastructure and operators, which complicates attribution and multiplies the potential impact when converging.
For companies that subcontract development or maintain distributed equipment, the lesson is clear and urgent. It is not enough to rely on the apparent provenance of a repository or the veracity of a superficially verified job offer.. Review integration pipelines, impose restrictions on code execution on corporate devices and separate technical assessment environments from those with access to productive environments are measures that should be incorporated into security policies as soon as possible. Official agencies such as CISA and frameworks such as MITRE ATT & CK provide resources and references to understand tactics and mitigate risks related to persistent threat campaigns.
It is also worth recalling that attackers exploit confidence: a popular Visual Studio Code project, an example package or a technical challenge may seem harmless, but a single reckless execution can open a door to the corporate network. Good practices include strict validation of dependencies, blocking of non-signed scripts in corporate machines, use of isolated testing environments and continuing education for recruitment teams and human resources, as they are the most interacting with external candidates.

At an operational level, the diversification of controls - endpoints detection, traffic monitoring to suspicious infrastructure, block lists and network segmentation - reduces the likelihood that a single error will lead to a larger gap. And at the strategic level, organizations should consider the risk posed by a large customer-based supplier in regions where these campaigns run their lures, because a supply chain infringement can multiply the consequences.
The incidents that combine social engineering, abuse of development platforms and creative uses of infrastructure such as commercial VPN are complex and require equally multidisciplinary responses. Reports such as Recorded Future and publications of threat laboratories such as Jamf They help to understand the landscape and to prioritize defenses, but the implementation falls to each organization: there is no single cure, but the need for combined layers of prevention, detection and response.
In short, the campaign known as Contagious Interview and related operations show how actors with diverse motivations can take advantage of both new techniques and predictable human practices. The security of software and procurement processes should be treated as an integrated whole, and both technical equipment and business areas must be coordinated to reduce the opportunity window of these attackers. In order to keep up to date, it is still recommended to consult specialized sources and update policies on the basis of new public reports.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...