javascript

7 posts

discord

Supercharging Discord Mobile: Our Journey to a Faster App (opens in new tab)

Discord leverages React and React Native to maintain high development velocity across desktop and mobile platforms while navigating the performance constraints of cross-platform frameworks. After initially avoiding React Native for Android due to hardware limitations, the company transitioned its client in 2022 by utilizing the Hermes JavaScript engine and targeting improved device capabilities. This strategic shift has allowed for significant efficiency gains, including a 50% reduction in median startup times as the team shifts focus toward optimizing experiences for power users. ### Cross-Platform Development and Android Transition * Discord uses React for desktop and React Native for mobile to allow unified feature shipping across platforms. * The company originally delayed adopting React Native on Android to avoid performance degradation on a wide range of hardware. * The formal transition to React Native for Android occurred in 2022, spurred by the introduction of Hermes, a JavaScript engine optimized for React Native. ### Performance Optimization and Efficiency * React Native introduced specific trade-offs, particularly regarding startup times on lower-end Android devices. * Discord’s engineering team successfully halved median startup times throughout 2023 through focused architectural improvements. * Current development efforts are prioritizing performance for "power users" who push the app's limits, ensuring stability and speed for high-intensity use cases. Discord’s journey highlights that while cross-platform frameworks like React Native require rigorous optimization—especially on Android—the trade-off for development speed and feature parity is increasingly viable through modern tools like the Hermes engine.

gitlab

GitLab Threat Intelligence Team reveals North Korean tradecraft (opens in new tab)

The GitLab Threat Intelligence Team has detailed its efforts to disrupt North Korean (DPRK) cyber campaigns, specifically focusing on "Contagious Interview" malware distribution and fraudulent IT worker schemes. By analyzing internal platform data, GitLab identified that these state-sponsored actors leverage legitimate tools and fake recruitment scenarios to compromise software developers and generate illicit revenue for the regime. The report concludes that while these operations are sophisticated and persistent, proactive monitoring and cross-industry intelligence sharing are essential to mitigating these evolving threats. ### Contagious Interview Mechanics * Threat actors pose as recruiters to trick software developers into executing malicious JavaScript projects under the guise of technical interviews. * The primary goal is to deploy malware families such as BeaverTail and Ottercookie, which facilitate credential theft and provide remote control of the victim's device. * A notable evolution in tradecraft includes the use of "ClickFix," a compiled BeaverTail variant identified in late 2025. * Malicious repositories often use a specific execution pattern where base64-encoded URLs and secret headers are hidden within `.env` files, masquerading as benign configuration variables. * To execute the payload, actors utilize `Function.constructor` to load strings as executable code, often triggered by custom error handlers designed to source remote content. ### 2025 Campaign Trends and Infrastructure * GitLab banned 131 unique accounts linked to these campaigns in 2025, with activity peaking in September and averaging 11 bans per month. * Nearly 90% of malicious accounts were created using Gmail addresses, and actors typically accessed the platform through consumer VPNs or dedicated VPS infrastructure. * In more than 80% of cases, malware payloads were not stored on GitLab. Instead, actors used concealed loaders to fetch content from legitimate hosting services, most commonly Vercel. * Recent tactics include the creation of malicious NPM dependencies immediately before use and the exploitation of VS Code tasks to pipe remote content into native shells. ### IT Worker Campaigns and Sanctions Evasion * Beyond malware distribution, DPRK actors use GitLab to support "IT worker" cells that generate revenue and evade international sanctions. * One identified pipeline involved the creation of at least 135 synthetic identities, automated to generate professional connections and contact leads at scale. * Threat actors have been observed adding their own images to stolen U.S. identity documents to bypass employment verification processes. * Forensic analysis revealed financial records from cell managers detailing revenue proceeds from 2022 through 2025, often earned while operating from locations like Moscow, Russia. Organizations should remain vigilant against recruitment-themed social engineering and scrutinize unexpected requests to run external code. GitLab recommends that the security community use the provided indicators of compromise to update defensive posture, as these actors continue to refine their ability to hide malicious intent within legitimate development workflows.