Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Beware of Weaponized VS Code Extension Named ClawdBot Agent that Deploys ScreenConnect RAT

Posted on January 29, 2026January 29, 2026 By CWS

A malicious VS Code extension has surfaced within the digital risk panorama, concentrating on builders who depend on coding instruments day by day.

Found on January 27, 2026, the pretend “ClawdBot Agent” extension introduced itself as a official AI-powered assistant, but it surely hid a harmful payload beneath.

Not like the precise Clawdbot service, which by no means launched an official VS Code extension, this imposter efficiently registered the identify first and tricked customers into putting in it.

The risk instantly caught the eye of safety monitoring techniques, which detected uncommon exercise the second VS Code launched.

The deception runs deeper than a easy identify theft. The extension functioned precisely like marketed, integrating with fashionable AI suppliers together with OpenAI, Anthropic, and Google.

This working performance created a false sense of safety, as customers had no motive to suspect malicious habits.

Inside seconds of set up, the extension started its assault, silently deploying malware onto Home windows machines with out consumer data or consent. Microsoft acted swiftly upon notification and eliminated the extension from its market.

Aikido safety analysts recognized the true nature of this risk after detailed investigation. They found that the extension contained code designed to run routinely each time VS Code began.

The JavaScript code established a connection to an exterior server to fetch configuration directions, which then downloaded and executed a number of malicious information disguised as official system elements.

An infection Mechanism and ScreenConnect Deployment

Essentially the most regarding side includes how the attackers weaponized official distant entry software program.

When executed, the dropper deployed ScreenConnect, a trusted IT assist instrument, configured to speak with attacker-controlled servers at assembly.bulletmailer.web on port 8041.

The attackers created their very own ScreenConnect relay server and pre-configured consumer installers, distributing them by the VS Code extension.

Victims unknowingly acquired a completely practical ScreenConnect consumer that instantly established distant connections to the attacker’s infrastructure.

A Rust-based DLL file supplied redundant supply functionality, fetching backup payloads from Dropbox disguised as a Zoom replace.

This multi-layered strategy ensured success even when major command-and-control servers have been disabled. The attackers employed three separate fallback mechanisms, demonstrating refined operational planning.

Customers who put in this extension ought to instantly uninstall it, take away ScreenConnect from their techniques, and block the infrastructure domains.

Rotating API keys for any AI companies accessed by the extension is strongly advisable. The risk underscores the significance of verifying extension authenticity earlier than set up.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Agent, Beware, Clawdbot, Code, Deploys, Extension, Named, RAT, ScreenConnect, Weaponized

Post navigation

Previous Post: Python-based PyRAT with Cross-Platform Capabilities and Extensive Remote Access Features
Next Post: Threat Actors Leverage Google Search Ads for ‘Mac Cleaner’ to Direct Users to Malicious Websites

Related Posts

Pro-Russian Hackers Attacking Key Industries in Major Countries Around The World Cyber Security News
Google Chrome 0-Day Vulnerability Exploited in the Wild Cyber Security News
Hackers Allegedly Claim Breach of Mercedes-Benz USA Legal and Customer Data Cyber Security News
Reddit to Block Internet Archive as AI Companies Have Scraped Data From Wayback Machine Cyber Security News
Node.js Updated HackerOne Program to Require a Signal of 1.0 or Higher to Submit Vulnerability Reports Cyber Security News
Realtek Vulnerability Let Attackers Trigger DoS Attack via Bluetooth Secure Connections Pairing Process Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Exposed Open Directory Leaks BYOB Framework Across Windows, Linux, and macOS
  • Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
  • Threat Actors Leverage Google Search Ads for ‘Mac Cleaner’ to Direct Users to Malicious Websites
  • Beware of Weaponized VS Code Extension Named ClawdBot Agent that Deploys ScreenConnect RAT
  • Python-based PyRAT with Cross-Platform Capabilities and Extensive Remote Access Features

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Exposed Open Directory Leaks BYOB Framework Across Windows, Linux, and macOS
  • Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
  • Threat Actors Leverage Google Search Ads for ‘Mac Cleaner’ to Direct Users to Malicious Websites
  • Beware of Weaponized VS Code Extension Named ClawdBot Agent that Deploys ScreenConnect RAT
  • Python-based PyRAT with Cross-Platform Capabilities and Extensive Remote Access Features

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark