CybersecurityCodeSteal: VS Code Extension Hijacking for Crypto and Credential Theft

CodeSteal: VS Code Extension Hijacking for Crypto and Credential Theft

Key Takeaways:

  • A new malware campaign, Evelyn Stealer, is targeting software developers by exploiting the Microsoft Visual Studio Code (VS Code) extension ecosystem.
  • The malware is designed to steal sensitive information, including developer credentials, cryptocurrency-related data, and other sensitive information.
  • The campaign targets organizations with software development teams that rely on VS Code and third-party extensions.
  • The malware can also be used to gain access to broader organizational systems, including production systems, cloud resources, and digital assets.
  • Two new Python-based stealer malware families, MonetaStealer and SolyxImmortal, have also been discovered, with the former capable of targeting Apple macOS systems.

Introduction to Evelyn Stealer
The Evelyn Stealer malware campaign is a newly discovered threat that targets software developers by exploiting the VS Code extension ecosystem. This campaign is designed to steal sensitive information, including developer credentials, cryptocurrency-related data, and other sensitive information. The malware is capable of compromising developer environments, which can then be used as access points to broader organizational systems, including production systems, cloud resources, and digital assets. This campaign highlights the increasing importance of securing developer environments and the need for organizations to take proactive measures to protect themselves against such threats.

Technical Details of Evelyn Stealer
The Evelyn Stealer malware is designed to be stealthy and evasive, using a variety of techniques to avoid detection. The malware is distributed through compromised VS Code extensions, which are then used to launch a malicious downloader DLL. This DLL launches a hidden PowerShell command to fetch and execute a second-stage payload, which decrypts and injects the main stealer payload into a legitimate Windows process. The malware then collects sensitive information, including clipboard content, installed apps, cryptocurrency wallets, running processes, desktop screenshots, stored Wi-Fi credentials, and system information. The malware also collects credentials and stored cookies from Google Chrome and Microsoft Edge, and implements safeguards to detect analysis and virtual environments.

Evasion Techniques Used by Evelyn Stealer
The Evelyn Stealer malware uses a variety of evasion techniques to avoid detection. The malware launches the browser via the command line, using flags such as –headless=new, –disable-gpu, –no-sandbox, –disable-extensions, –disable-logging, –silent-launch, –no-first-run, –disable-popup-blocking, –window-position=-10000,-10000, and –window-size=1,1. These flags allow the malware to run in headless mode, prevent GPU acceleration, disable browser security sandbox, prevent legitimate security extensions from interfering, disable browser log generation, suppress startup notifications, bypass initial setup dialogs, ensure malicious content can execute, and position the window off-screen. The malware also creates a mutual exclusion (mutex) object to ensure that only one instance of the malware can run at any given time, preventing multiple instances of the malware from being executed on a compromised host.

Other Malware Campaigns
In addition to the Evelyn Stealer campaign, two new Python-based stealer malware families, MonetaStealer and SolyxImmortal, have been discovered. MonetaStealer is capable of targeting Apple macOS systems, enabling comprehensive data theft. SolyxImmortal, on the other hand, leverages legitimate system APIs and widely available third-party libraries to extract sensitive user data and exfiltrate it to attacker-controlled Discord webhooks. The design of SolyxImmortal emphasizes stealth, reliability, and long-term access, rather than rapid execution or destructive behavior. By operating entirely in user space and relying on trusted platforms for command-and-control, the malware reduces its likelihood of immediate detection while maintaining persistent visibility into user activity.

Conclusion and Recommendations
The discovery of the Evelyn Stealer campaign and the emergence of new stealer malware families highlight the increasing importance of securing developer environments and protecting against such threats. Organizations should take proactive measures to protect themselves, including implementing robust security controls, monitoring developer environments for suspicious activity, and educating developers about the risks of malware and the importance of secure coding practices. Additionally, organizations should consider implementing measures to detect and prevent the use of compromised VS Code extensions, and to monitor for signs of malware activity. By taking these steps, organizations can reduce the risk of compromise and protect their sensitive information from theft.

- Advertisement -spot_img

More From UrbanEdge

Queensland Flood Alerts: Storms to End Extreme Heatwave

Queensland Flood Alerts: Storms to End Extreme Heatwave Projected Rainfall...

Queensland Flood Warning, Alerts & Weekend Forecast

Queensland braces for heavy rain and potential flooding as a low-pressure trough stalls over the state. With predicted rainfall of 100-300mm through Sunday, authorities urge preparedness. SE regions may face disruptions, extending the alert to northeast New South Wales. Prepare emergency kits and plans now...

Brisbane Flood Risk: Storms Predicted to End Heatwave

Brisbane residents brace for storms set to end the relentless heatwave. Expect heavy rainfall, with up to 150mm in some areas, increasing flood risks, especially in low-lying regions. Flash floods are possible, and temperatures could drop by 10 degrees. Prepare emergency kits and stay updated on weather developments...

Apple Zero-Day Fix: Sophisticated Attack Solution & Patch

Apple has urgently patched two zero-day vulnerabilities in WebKit used in highly complex attacks targeting specific individuals. Security experts emphasize immediate updates to protect against these threats, linked to advanced actors, possibly nation-states. The overlapping nature of these exploits suggests a coordinated effort...

Windows 11 Notepad Vulnerability: Silent File Execution via Markdown Links

A critical vulnerability in Windows 11 Notepad's Markdown feature allows remote code execution via malicious links, posing a serious risk to users. Microsoft has issued a patch, but immediate updates and extra defenses are essential to prevent exploitation and ensure secure computing environments...

Microsoft Store Outlook Add-in Hijack Steals 4,000 Accounts

A sophisticated attack on Microsoft Outlook users has emerged, compromising over 4,000 accounts through the hijacked AgreeTo add-in. Hackers exploited an abandoned domain to steal Microsoft credentials directly from the Marketplace, bypassing usual security measures and impacting both user data and financial information...

CISA Mandate: Upgrade & Identify Unsupported Edge Devices for Agencies

CISA mandates federal agencies to replace unsupported edge devices prone to advanced threat actor exploits. Agencies have three months to identify, 12 months to begin upgrades, and 18 months for full remediation to protect network perimeters from cyber threats. SecureEdge Solutions offers assistance in securing network vulnerabilities...

Coinbase Insider Breach: Leaked Support Tool Screenshots

In May 2025, Coinbase experienced a sophisticated insider breach affecting 70,000 users. Hackers bribed support agents to leak sensitive data, resulting in over $2 million in theft through targeted scams. Coinbase responded by refusing ransom, launching a bounty program, and refunding victims...

Sector Impact Overview: Architecting the AI Integration Era

Sector Impact Overview: Architecting the AI Integration Era 1. Introduction:...
- Advertisement -spot_img