Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Malicious VS Code Extensions Deploy Advanced Infostealer
News

Malicious VS Code Extensions Deploy Advanced Infostealer

Team-CWDBy Team-CWDDecember 10, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new pair of malicious Visual Studio Code extensions capable of harvesting screenshots, browser sessions and stored credentials has been discovered by cybersecurity researchers.

The extensions, Bitcoin Black and Codo AI, were available on the VS Code marketplace and were observed delivering a stealthy DLL-based infostealer through an unusual combination of social engineering and technical disguise.

The malicious tools were detailed in a report published by the Koi Security research team on Monday.

Two Extensions, One Campaign

Koi said what’s new about this campaign is the way the attacker packaged the tools.

Bitcoin Black presented itself as a cryptocurrency-themed color scheme, while Codo AI offered a functional coding assistant that integrated ChatGPT and DeepSeek. Both, however, executed hidden scripts that downloaded a payload using a bundled version of the Lightshot screenshot tool paired with a malicious DLL.

The researchers found that Bitcoin Black, despite claiming to be only a theme, used activation events and PowerShell execution uncommon for legitimate themes.

Codo AI went further by providing genuine coding features, which helped the attacker avoid suspicion during installation and use.

Read more on developer tool security: Red Team Tool Developer Shellter Admits ‘Misuse’ by Adversaries

Koi said they analyzed multiple versions of the extensions and observed rapid refinement. Version 2.5.0 relied on a complex PowerShell routine that downloaded a password-protected ZIP archive and attempted extraction through several fallback methods.

By version 3.3.0, the attacker had streamlined the delivery chain, switching to a hidden batch script that fetched an executable and DLL directly over HTTP and prevented repeated execution through a marker file.

The infostealer collected a wide range of information, including:

  • Clipboard contents

  • Installed programs

  • Running processes

  • Desktop screenshots

  • Stored WiFi credentials

  • Browser session data

DLL Hijacking and C2 Links

As mentioned above, the payload used DLL hijacking by pairing a legitimate Lightshot executable with the attacker’s DLL. This method allowed the malware to run under the guise of a trusted binary.

Koi Security identified command-and-control (C2) domains designed to receive exfiltrated data, along with a distinct mutex name intended to stop multiple instances from running simultaneously.

The researchers attributed both extensions to the same threat actor experimenting with separate lures. 

“A developer could install what looks like a harmless theme or a useful AI tool, and within seconds their WiFi passwords, clipboard contents and browser sessions are being exfiltrated to a remote server,” they explained.

“At the time of writing, Codo AI is still live on the VS Code marketplace. The attack surface for developer tools continues to expand, and attackers are paying attention.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware
Next Article India Orders Phone Makers to Pre-Install Government App to Tackle Telecom Fraud
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Look out for phony verification pages spreading malware

September 14, 2025

Children and chatbots: What parents should know

January 23, 2026

Watch out for SVG files booby-trapped with malware

September 22, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.