Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Beware of Weaponized VS Code Extension Named ClawdBot Agent that Deploys ScreenConnect RAT

Beware of Weaponized VS Code Extension Named ClawdBot Agent that Deploys ScreenConnect RAT

Posted on January 29, 2026January 29, 2026 By CWS

A malicious VS Code extension has surfaced within the digital risk panorama, concentrating on builders who depend on coding instruments day by day.

Found on January 27, 2026, the pretend “ClawdBot Agent” extension introduced itself as a official AI-powered assistant, but it surely hid a harmful payload beneath.

Not like the precise Clawdbot service, which by no means launched an official VS Code extension, this imposter efficiently registered the identify first and tricked customers into putting in it.

The risk instantly caught the eye of safety monitoring techniques, which detected uncommon exercise the second VS Code launched.

The deception runs deeper than a easy identify theft. The extension functioned precisely like marketed, integrating with fashionable AI suppliers together with OpenAI, Anthropic, and Google.

This working performance created a false sense of safety, as customers had no motive to suspect malicious habits.

Inside seconds of set up, the extension started its assault, silently deploying malware onto Home windows machines with out consumer data or consent. Microsoft acted swiftly upon notification and eliminated the extension from its market.

Aikido safety analysts recognized the true nature of this risk after detailed investigation. They found that the extension contained code designed to run routinely each time VS Code began.

The JavaScript code established a connection to an exterior server to fetch configuration directions, which then downloaded and executed a number of malicious information disguised as official system elements.

An infection Mechanism and ScreenConnect Deployment

Essentially the most regarding side includes how the attackers weaponized official distant entry software program.

When executed, the dropper deployed ScreenConnect, a trusted IT assist instrument, configured to speak with attacker-controlled servers at assembly.bulletmailer.web on port 8041.

The attackers created their very own ScreenConnect relay server and pre-configured consumer installers, distributing them by the VS Code extension.

Victims unknowingly acquired a completely practical ScreenConnect consumer that instantly established distant connections to the attacker’s infrastructure.

A Rust-based DLL file supplied redundant supply functionality, fetching backup payloads from Dropbox disguised as a Zoom replace.

This multi-layered strategy ensured success even when major command-and-control servers have been disabled. The attackers employed three separate fallback mechanisms, demonstrating refined operational planning.

Customers who put in this extension ought to instantly uninstall it, take away ScreenConnect from their techniques, and block the infrastructure domains.

Rotating API keys for any AI companies accessed by the extension is strongly advisable. The risk underscores the significance of verifying extension authenticity earlier than set up.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Agent, Beware, Clawdbot, Code, Deploys, Extension, Named, RAT, ScreenConnect, Weaponized

Post navigation

Previous Post: Python-based PyRAT with Cross-Platform Capabilities and Extensive Remote Access Features
Next Post: Threat Actors Leverage Google Search Ads for ‘Mac Cleaner’ to Direct Users to Malicious Websites

Related Posts

Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code Cyber Security News
Cisco Secure Firewall Snort 3 Detection Engine Vulnerability Enables DoS Attacks Cisco Secure Firewall Snort 3 Detection Engine Vulnerability Enables DoS Attacks Cyber Security News
Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof Cyber Security News
Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy Threat Actors Weaponize PDF Editor With New Torjan to Turn Device Into Proxy Cyber Security News
Linux Kernel’s KSMBD Subsystem Vulnerability Let Remote Attackers Exhaust Server Resources Linux Kernel’s KSMBD Subsystem Vulnerability Let Remote Attackers Exhaust Server Resources Cyber Security News
Ubisoft Rainbow Six Siege Servers Breach linked to MongoBleed Vulnerability Ubisoft Rainbow Six Siege Servers Breach linked to MongoBleed Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News