Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ‘SleepyDuck’ Malware in Open VSX Marketplace Allow Attackers to Control Windows Systems Remotely

Posted on November 4, 2025November 4, 2025 By CWS

A classy distant entry trojan named SleepyDuck has infiltrated the Open VSX IDE extension market, focusing on builders utilizing code editors like Cursor and Windsurf.

The malware disguised itself as a respectable Solidity extension beneath the identifier juan-bianco.solidity-vlang, exploiting identify squatting strategies to deceive unsuspecting customers.

Initially printed on October thirty first as model 0.0.7, the extension appeared innocent till it was maliciously up to date to model 0.0.8 on November 1st, gaining new capabilities after accumulating 14,000 downloads.

The extension masquerades as a improvement software for Solidity programming, a language generally utilized in blockchain and sensible contract improvement.

Attackers leveraged this well-liked class to maximise their sufferer pool amongst cryptocurrency builders and blockchain engineers.

What makes this risk notably harmful is its skill to determine persistent distant entry to contaminated Home windows programs whereas sustaining stealth by means of numerous evasion strategies.

Safe Annex analysts recognized the malware’s distinctive persistence mechanism that makes use of Ethereum blockchain contracts to take care of command and management infrastructure.

This modern method permits attackers to replace their management server addresses even when the first area is seized or taken offline.

Solidity extension (Supply – Safe Annex)

The malware communicates with sleepyduck[.]xyz as its default command and management server, using a 30-second polling interval to obtain directions from risk actors.

Sleepyduck occasion (Supply – Safe Annex)

The an infection begins when the extension prompts upon opening a brand new code editor window or deciding on a .sol file.

The malware retrieves vital machine data together with hostname, username, MAC tackle, and timezone information, which helps it evade sandbox evaluation environments generally utilized by safety researchers.

Ethereum-Powered Persistence Mechanism

SleepyDuck demonstrates superior persistence by means of blockchain expertise, representing a regarding evolution in malware infrastructure.

The risk maintains resilience by storing fallback configuration information in Ethereum contract tackle 0xDAfb81732db454DA238e9cFC9A9Fe5fb8e34c465.

When connectivity to the first command server fails, the malware queries this immutable blockchain contract to retrieve up to date server addresses, polling intervals, and even emergency instructions for all contaminated endpoints.

The malware’s activation operate creates a lock file to make sure single execution, then invokes a misleading webpack.init() operate that initializes the malicious payload.

Throughout initialization, it identifies the quickest Ethereum RPC supplier from a hardcoded record, establishes a command execution sandbox by means of vm.createContext(sandbox), and begins its polling loop to await attacker directions.

This structure grants attackers full distant management over compromised programs whereas sustaining operational safety by means of decentralized infrastructure that can not be simply dismantled.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Control, Malware, Marketplace, Open, Remotely, SleepyDuck, Systems, VSX, Windows

Post navigation

Previous Post: A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
Next Post: Attack Techniques of Tycoon 2FA Phishing Kit Targeting Microsoft 365 and Gmail Accounts Detailed

Related Posts

SimonMed Data Breach Exposes 1.2 Million Patients Sensitive Information Cyber Security News
New Frontiers In Identity-Based Access Control Cyber Security News
OpenAI is to Launch a AI Web Browser in Coming Weeks Cyber Security News
How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR? Cyber Security News
Leak Zone Dark Web Forum Database Exposes 22 Million Users’ IP Addresses and Locations Cyber Security News
South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Attack Techniques of Tycoon 2FA Phishing Kit Targeting Microsoft 365 and Gmail Accounts Detailed
  • New ‘SleepyDuck’ Malware in Open VSX Marketplace Allow Attackers to Control Windows Systems Remotely
  • A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
  • Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks
  • Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Attack Techniques of Tycoon 2FA Phishing Kit Targeting Microsoft 365 and Gmail Accounts Detailed
  • New ‘SleepyDuck’ Malware in Open VSX Marketplace Allow Attackers to Control Windows Systems Remotely
  • A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
  • Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks
  • Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News