Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Malware Discovered in 19 Visual Studio Code Extensions

December 12, 2025

Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code

December 12, 2025

OpenAI Enhances Defensive Models to Mitigate Cyber-Threats

December 11, 2025
Facebook X (Twitter) Instagram
Friday, December 12
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Malicious VS Code Extensions Deploy Advanced Infostealer
News

Malicious VS Code Extensions Deploy Advanced Infostealer

Team-CWDBy Team-CWDDecember 10, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new pair of malicious Visual Studio Code extensions capable of harvesting screenshots, browser sessions and stored credentials has been discovered by cybersecurity researchers.

The extensions, Bitcoin Black and Codo AI, were available on the VS Code marketplace and were observed delivering a stealthy DLL-based infostealer through an unusual combination of social engineering and technical disguise.

The malicious tools were detailed in a report published by the Koi Security research team on Monday.

Two Extensions, One Campaign

Koi said what’s new about this campaign is the way the attacker packaged the tools.

Bitcoin Black presented itself as a cryptocurrency-themed color scheme, while Codo AI offered a functional coding assistant that integrated ChatGPT and DeepSeek. Both, however, executed hidden scripts that downloaded a payload using a bundled version of the Lightshot screenshot tool paired with a malicious DLL.

The researchers found that Bitcoin Black, despite claiming to be only a theme, used activation events and PowerShell execution uncommon for legitimate themes.

Codo AI went further by providing genuine coding features, which helped the attacker avoid suspicion during installation and use.

Read more on developer tool security: Red Team Tool Developer Shellter Admits ‘Misuse’ by Adversaries

Koi said they analyzed multiple versions of the extensions and observed rapid refinement. Version 2.5.0 relied on a complex PowerShell routine that downloaded a password-protected ZIP archive and attempted extraction through several fallback methods.

By version 3.3.0, the attacker had streamlined the delivery chain, switching to a hidden batch script that fetched an executable and DLL directly over HTTP and prevented repeated execution through a marker file.

The infostealer collected a wide range of information, including:

  • Clipboard contents

  • Installed programs

  • Running processes

  • Desktop screenshots

  • Stored WiFi credentials

  • Browser session data

DLL Hijacking and C2 Links

As mentioned above, the payload used DLL hijacking by pairing a legitimate Lightshot executable with the attacker’s DLL. This method allowed the malware to run under the guise of a trusted binary.

Koi Security identified command-and-control (C2) domains designed to receive exfiltrated data, along with a distinct mutex name intended to stop multiple instances from running simultaneously.

The researchers attributed both extensions to the same threat actor experimenting with separate lures. 

“A developer could install what looks like a harmless theme or a useful AI tool, and within seconds their WiFi passwords, clipboard contents and browser sessions are being exfiltrated to a remote server,” they explained.

“At the time of writing, Codo AI is still live on the VS Code marketplace. The attack surface for developer tools continues to expand, and attackers are paying attention.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware
Next Article India Orders Phone Makers to Pre-Install Government App to Tackle Telecom Fraud
Team-CWD
  • Website

Related Posts

News

Malware Discovered in 19 Visual Studio Code Extensions

December 12, 2025
News

Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code

December 12, 2025
News

OpenAI Enhances Defensive Models to Mitigate Cyber-Threats

December 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Watch out for SVG files booby-trapped with malware

September 22, 2025

When ‘hacking’ your game becomes a security risk

October 17, 2025

How cybercriminals are targeting content creators

November 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.