Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Posted on December 4, 2025December 4, 2025 By CWS

A faux Visible Studio Code extension has been utilized in a provide chain assault that targets builders by way of their editor.

The rogue extension, named prettier-vscode-plus and posing because the trusted Prettier formatter, appeared briefly within the official VSCode Market earlier than takedown.

As soon as put in, it pulled staged scripts from a GitHub repository referred to as vscode beneath the account biwwwwwwwwwww.

Risk actor’s GitHub repository ‘vscode’ containing malicious VBScript payloads (Supply – Hunt.io)

The extension blended into regular developer workflows, triggering its payload when initiatives have been opened. Behind the scenes, it fetched an obfuscated VBScript file that served because the first-stage dropper.

This script wrote a PowerShell loader into the temp folder and ran it with execution coverage bypass flags, whereas hiding all home windows from the consumer.

Hunt.io safety analysts recognized the exercise after tracing suspicious VBScript downloads again to the vscode repository and linking them to the short-lived market itemizing.

The influence is critical, and the ultimate payload is OctoRAT, a full distant entry device deployed by way of an intermediate element referred to as the Anivia loader.

Collectively, they allow code execution, knowledge theft from browsers and wallets, and distant desktop management on developer techniques.

Regardless that the extension had solely a handful of installs, the targets are excessive worth, with entry to supply code and manufacturing techniques.

An infection chain and loader conduct

The an infection begins with a VBScript dropper that creates a random PowerShell file within the temp path and populates it with a Base64-encoded AES payload.

First-stage VBScript dropper initializing AES decryption (Supply – Hunt.io)

The script makes use of COM objects akin to WScript.Shell to run the loader with out consumer prompts. A simplified view of the persistence job later set by OctoRAT appears like:

schtasks.exe /create /tn “WindowsUpdate” /tr “” /sc minute /mo 1 /f

The PowerShell loader decrypts the embedded blob utilizing AES-256 in CBC mode and executes the end result straight in reminiscence.

Anivia then takes over, storing its encrypted payload in a byte array and utilizing a hard-coded key to decrypt a conveyable executable.

That payload is injected into the trusted vbc.exe course of by way of course of hollowing, which helps it keep away from widespread endpoint checks.

OctoRAT Heart login panel (Supply – Hunt.io)

From there, OctoRAT launches, units the WindowsUpdate job for repeat startup, and opens an encrypted command channel to attacker management servers.

This entire technical breakdown exhibits how one faux extension can ship a full intrusion in a couple of steps.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Anivia, Deploy, Extension, Loader, Malicious, OctoRAT, Threat, VSCode

Post navigation

Previous Post: India’s New SIM-Binding Rule for WhatsApp, Signal, Telegram, and Other Messaging Platforms
Next Post: Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware

Related Posts

AWS Outage Impacts Amazon, Snapchat, Prime Video, Canva and More Cyber Security News
Microsoft Office.com Suffers Major Outage, Investigation Underway Cyber Security News
Lazarus APT Group New ScoringMathTea RAT Enables Remote Command Execution Among Other Capabilities Cyber Security News
Threat Actors Weaponizing GitHub Accounts To Host Payloads, Tools and Amadey Malware Plug-Ins Cyber Security News
Iranian APTs Hackers Actively Attacking Transportation and Manufacturing Sectors Cyber Security News
New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark