Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Posted on December 4, 2025December 4, 2025 By CWS

A faux Visible Studio Code extension has been utilized in a provide chain assault that targets builders by way of their editor.

The rogue extension, named prettier-vscode-plus and posing because the trusted Prettier formatter, appeared briefly within the official VSCode Market earlier than takedown.

As soon as put in, it pulled staged scripts from a GitHub repository referred to as vscode beneath the account biwwwwwwwwwww.

Risk actor’s GitHub repository ‘vscode’ containing malicious VBScript payloads (Supply – Hunt.io)

The extension blended into regular developer workflows, triggering its payload when initiatives have been opened. Behind the scenes, it fetched an obfuscated VBScript file that served because the first-stage dropper.

This script wrote a PowerShell loader into the temp folder and ran it with execution coverage bypass flags, whereas hiding all home windows from the consumer.

Hunt.io safety analysts recognized the exercise after tracing suspicious VBScript downloads again to the vscode repository and linking them to the short-lived market itemizing.

The influence is critical, and the ultimate payload is OctoRAT, a full distant entry device deployed by way of an intermediate element referred to as the Anivia loader.

Collectively, they allow code execution, knowledge theft from browsers and wallets, and distant desktop management on developer techniques.

Regardless that the extension had solely a handful of installs, the targets are excessive worth, with entry to supply code and manufacturing techniques.

An infection chain and loader conduct

The an infection begins with a VBScript dropper that creates a random PowerShell file within the temp path and populates it with a Base64-encoded AES payload.

First-stage VBScript dropper initializing AES decryption (Supply – Hunt.io)

The script makes use of COM objects akin to WScript.Shell to run the loader with out consumer prompts. A simplified view of the persistence job later set by OctoRAT appears like:

schtasks.exe /create /tn “WindowsUpdate” /tr “” /sc minute /mo 1 /f

The PowerShell loader decrypts the embedded blob utilizing AES-256 in CBC mode and executes the end result straight in reminiscence.

Anivia then takes over, storing its encrypted payload in a byte array and utilizing a hard-coded key to decrypt a conveyable executable.

That payload is injected into the trusted vbc.exe course of by way of course of hollowing, which helps it keep away from widespread endpoint checks.

OctoRAT Heart login panel (Supply – Hunt.io)

From there, OctoRAT launches, units the WindowsUpdate job for repeat startup, and opens an encrypted command channel to attacker management servers.

This entire technical breakdown exhibits how one faux extension can ship a full intrusion in a couple of steps.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Anivia, Deploy, Extension, Loader, Malicious, OctoRAT, Threat, VSCode

Post navigation

Previous Post: India’s New SIM-Binding Rule for WhatsApp, Signal, Telegram, and Other Messaging Platforms
Next Post: Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware

Related Posts

Microsoft to Kill Popular Editor Browser Extensions on Edge and Chrome Cyber Security News
HackerOne Confirms Data Breach – Hackers Gained Unauthorized Access To Salesforce Instance Cyber Security News
APT37 Hackers Weaponizes JPEG Files to Attack Windows System Leveraging “mspaint.exe” File Cyber Security News
Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests Cyber Security News
Google’s Salesforce Instances Hacked in Ongoing Attack Cyber Security News
Microsoft Confirms Error Entry in Windows Firewall With Advanced Security Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT
  • India’s New SIM-Binding Rule for WhatsApp, Signal, Telegram, and Other Messaging Platforms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT
  • India’s New SIM-Binding Rule for WhatsApp, Signal, Telegram, and Other Messaging Platforms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark