Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ‘SleepyDuck’ Malware in Open VSX Marketplace Allow Attackers to Control Windows Systems Remotely

New ‘SleepyDuck’ Malware in Open VSX Marketplace Allow Attackers to Control Windows Systems Remotely

Posted on November 4, 2025November 4, 2025 By CWS

A classy distant entry trojan named SleepyDuck has infiltrated the Open VSX IDE extension market, focusing on builders utilizing code editors like Cursor and Windsurf.

The malware disguised itself as a respectable Solidity extension beneath the identifier juan-bianco.solidity-vlang, exploiting identify squatting strategies to deceive unsuspecting customers.

Initially printed on October thirty first as model 0.0.7, the extension appeared innocent till it was maliciously up to date to model 0.0.8 on November 1st, gaining new capabilities after accumulating 14,000 downloads.

The extension masquerades as a improvement software for Solidity programming, a language generally utilized in blockchain and sensible contract improvement.

Attackers leveraged this well-liked class to maximise their sufferer pool amongst cryptocurrency builders and blockchain engineers.

What makes this risk notably harmful is its skill to determine persistent distant entry to contaminated Home windows programs whereas sustaining stealth by means of numerous evasion strategies.

Safe Annex analysts recognized the malware’s distinctive persistence mechanism that makes use of Ethereum blockchain contracts to take care of command and management infrastructure.

This modern method permits attackers to replace their management server addresses even when the first area is seized or taken offline.

Solidity extension (Supply – Safe Annex)

The malware communicates with sleepyduck[.]xyz as its default command and management server, using a 30-second polling interval to obtain directions from risk actors.

Sleepyduck occasion (Supply – Safe Annex)

The an infection begins when the extension prompts upon opening a brand new code editor window or deciding on a .sol file.

The malware retrieves vital machine data together with hostname, username, MAC tackle, and timezone information, which helps it evade sandbox evaluation environments generally utilized by safety researchers.

Ethereum-Powered Persistence Mechanism

SleepyDuck demonstrates superior persistence by means of blockchain expertise, representing a regarding evolution in malware infrastructure.

The risk maintains resilience by storing fallback configuration information in Ethereum contract tackle 0xDAfb81732db454DA238e9cFC9A9Fe5fb8e34c465.

When connectivity to the first command server fails, the malware queries this immutable blockchain contract to retrieve up to date server addresses, polling intervals, and even emergency instructions for all contaminated endpoints.

The malware’s activation operate creates a lock file to make sure single execution, then invokes a misleading webpack.init() operate that initializes the malicious payload.

Throughout initialization, it identifies the quickest Ethereum RPC supplier from a hardcoded record, establishes a command execution sandbox by means of vm.createContext(sandbox), and begins its polling loop to await attacker directions.

This structure grants attackers full distant management over compromised programs whereas sustaining operational safety by means of decentralized infrastructure that can not be simply dismantled.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Control, Malware, Marketplace, Open, Remotely, SleepyDuck, Systems, VSX, Windows

Post navigation

Previous Post: A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
Next Post: RondoDox Botnet Updated Their Arsenal with 650% More Exploits Targeting Enterprises

Related Posts

Ransomware incidents Targeting Japan Increased by Approximately 1.4 Times Ransomware incidents Targeting Japan Increased by Approximately 1.4 Times Cyber Security News
New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards Cyber Security News
Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen  Million from Victims Biggest Ever GreedyBear Attack With 650 Hacking Tools Stolen $1 Million from Victims Cyber Security News
2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability 2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability Cyber Security News
Sweet Security Brings Runtime-CNAPP Power to Windows Sweet Security Brings Runtime-CNAPP Power to Windows Cyber Security News
APT Hackers Exploit ChatGPT to Create Sophisticated Malware and Phishing Emails APT Hackers Exploit ChatGPT to Create Sophisticated Malware and Phishing Emails Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybercriminals Exploit Cloud Services for Phishing
  • Addressing SOC False Negatives with Interactive Analysis
  • Interlock Ransomware Utilizes Zero-Day to Evade Security
  • Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs
  • PhantomVAI Loader Utilizes RunPE for Stealthy Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybercriminals Exploit Cloud Services for Phishing
  • Addressing SOC False Negatives with Interactive Analysis
  • Interlock Ransomware Utilizes Zero-Day to Evade Security
  • Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs
  • PhantomVAI Loader Utilizes RunPE for Stealthy Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark