Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Posted on December 4, 2025December 4, 2025 By CWS

A faux Visible Studio Code extension has been utilized in a provide chain assault that targets builders by way of their editor.

The rogue extension, named prettier-vscode-plus and posing because the trusted Prettier formatter, appeared briefly within the official VSCode Market earlier than takedown.

As soon as put in, it pulled staged scripts from a GitHub repository referred to as vscode beneath the account biwwwwwwwwwww.

Risk actor’s GitHub repository ‘vscode’ containing malicious VBScript payloads (Supply – Hunt.io)

The extension blended into regular developer workflows, triggering its payload when initiatives have been opened. Behind the scenes, it fetched an obfuscated VBScript file that served because the first-stage dropper.

This script wrote a PowerShell loader into the temp folder and ran it with execution coverage bypass flags, whereas hiding all home windows from the consumer.

Hunt.io safety analysts recognized the exercise after tracing suspicious VBScript downloads again to the vscode repository and linking them to the short-lived market itemizing.

The influence is critical, and the ultimate payload is OctoRAT, a full distant entry device deployed by way of an intermediate element referred to as the Anivia loader.

Collectively, they allow code execution, knowledge theft from browsers and wallets, and distant desktop management on developer techniques.

Regardless that the extension had solely a handful of installs, the targets are excessive worth, with entry to supply code and manufacturing techniques.

An infection chain and loader conduct

The an infection begins with a VBScript dropper that creates a random PowerShell file within the temp path and populates it with a Base64-encoded AES payload.

First-stage VBScript dropper initializing AES decryption (Supply – Hunt.io)

The script makes use of COM objects akin to WScript.Shell to run the loader with out consumer prompts. A simplified view of the persistence job later set by OctoRAT appears like:

schtasks.exe /create /tn “WindowsUpdate” /tr “” /sc minute /mo 1 /f

The PowerShell loader decrypts the embedded blob utilizing AES-256 in CBC mode and executes the end result straight in reminiscence.

Anivia then takes over, storing its encrypted payload in a byte array and utilizing a hard-coded key to decrypt a conveyable executable.

That payload is injected into the trusted vbc.exe course of by way of course of hollowing, which helps it keep away from widespread endpoint checks.

OctoRAT Heart login panel (Supply – Hunt.io)

From there, OctoRAT launches, units the WindowsUpdate job for repeat startup, and opens an encrypted command channel to attacker management servers.

This entire technical breakdown exhibits how one faux extension can ship a full intrusion in a couple of steps.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Anivia, Deploy, Extension, Loader, Malicious, OctoRAT, Threat, VSCode

Post navigation

Previous Post: India’s New SIM-Binding Rule for WhatsApp, Signal, Telegram, and Other Messaging Platforms
Next Post: Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware

Related Posts

OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code Cyber Security News
Threat Actors Weaponizing .hwp Files to Deliver RokRAT Malware Threat Actors Weaponizing .hwp Files to Deliver RokRAT Malware Cyber Security News
Highly Sophisticated macOS DigitStealer Employs Multi-Stage Attacks to Evade detection Highly Sophisticated macOS DigitStealer Employs Multi-Stage Attacks to Evade detection Cyber Security News
SoundCloud Data Breach Exposes 29.8 Million Personal users Details SoundCloud Data Breach Exposes 29.8 Million Personal users Details Cyber Security News
How Smart Timesheet Software Is Changing the Way of Work How Smart Timesheet Software Is Changing the Way of Work Cyber Security News
Critical Axios Flaw Allows Node.js Server Crashes Critical Axios Flaw Allows Node.js Server Crashes Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark