Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New ‘SleepyDuck’ Malware in Open VSX Marketplace Allow Attackers to Control Windows Systems Remotely

New ‘SleepyDuck’ Malware in Open VSX Marketplace Allow Attackers to Control Windows Systems Remotely

Posted on November 4, 2025November 4, 2025 By CWS

A classy distant entry trojan named SleepyDuck has infiltrated the Open VSX IDE extension market, focusing on builders utilizing code editors like Cursor and Windsurf.

The malware disguised itself as a respectable Solidity extension beneath the identifier juan-bianco.solidity-vlang, exploiting identify squatting strategies to deceive unsuspecting customers.

Initially printed on October thirty first as model 0.0.7, the extension appeared innocent till it was maliciously up to date to model 0.0.8 on November 1st, gaining new capabilities after accumulating 14,000 downloads.

The extension masquerades as a improvement software for Solidity programming, a language generally utilized in blockchain and sensible contract improvement.

Attackers leveraged this well-liked class to maximise their sufferer pool amongst cryptocurrency builders and blockchain engineers.

What makes this risk notably harmful is its skill to determine persistent distant entry to contaminated Home windows programs whereas sustaining stealth by means of numerous evasion strategies.

Safe Annex analysts recognized the malware’s distinctive persistence mechanism that makes use of Ethereum blockchain contracts to take care of command and management infrastructure.

This modern method permits attackers to replace their management server addresses even when the first area is seized or taken offline.

Solidity extension (Supply – Safe Annex)

The malware communicates with sleepyduck[.]xyz as its default command and management server, using a 30-second polling interval to obtain directions from risk actors.

Sleepyduck occasion (Supply – Safe Annex)

The an infection begins when the extension prompts upon opening a brand new code editor window or deciding on a .sol file.

The malware retrieves vital machine data together with hostname, username, MAC tackle, and timezone information, which helps it evade sandbox evaluation environments generally utilized by safety researchers.

Ethereum-Powered Persistence Mechanism

SleepyDuck demonstrates superior persistence by means of blockchain expertise, representing a regarding evolution in malware infrastructure.

The risk maintains resilience by storing fallback configuration information in Ethereum contract tackle 0xDAfb81732db454DA238e9cFC9A9Fe5fb8e34c465.

When connectivity to the first command server fails, the malware queries this immutable blockchain contract to retrieve up to date server addresses, polling intervals, and even emergency instructions for all contaminated endpoints.

The malware’s activation operate creates a lock file to make sure single execution, then invokes a misleading webpack.init() operate that initializes the malicious payload.

Throughout initialization, it identifies the quickest Ethereum RPC supplier from a hardcoded record, establishes a command execution sandbox by means of vm.createContext(sandbox), and begins its polling loop to await attacker directions.

This structure grants attackers full distant management over compromised programs whereas sustaining operational safety by means of decentralized infrastructure that can not be simply dismantled.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Control, Malware, Marketplace, Open, Remotely, SleepyDuck, Systems, VSX, Windows

Post navigation

Previous Post: A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
Next Post: RondoDox Botnet Updated Their Arsenal with 650% More Exploits Targeting Enterprises

Related Posts

Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
10 Best Malware Analysis Tools 10 Best Malware Analysis Tools Cyber Security News
Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers Cyber Security News
Massive “Shai-Halud” Supply Chain Attack Compromised 477 NPM Packages Massive “Shai-Halud” Supply Chain Attack Compromised 477 NPM Packages Cyber Security News
Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems Cyber Security News
Pro-Russian Hackers Attacking Key Industries in Major Countries Around The World Pro-Russian Hackers Attacking Key Industries in Major Countries Around The World Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News