Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Posted on December 4, 2025December 4, 2025 By CWS

A faux Visible Studio Code extension has been utilized in a provide chain assault that targets builders by way of their editor.

The rogue extension, named prettier-vscode-plus and posing because the trusted Prettier formatter, appeared briefly within the official VSCode Market earlier than takedown.

As soon as put in, it pulled staged scripts from a GitHub repository referred to as vscode beneath the account biwwwwwwwwwww.

Risk actor’s GitHub repository ‘vscode’ containing malicious VBScript payloads (Supply – Hunt.io)

The extension blended into regular developer workflows, triggering its payload when initiatives have been opened. Behind the scenes, it fetched an obfuscated VBScript file that served because the first-stage dropper.

This script wrote a PowerShell loader into the temp folder and ran it with execution coverage bypass flags, whereas hiding all home windows from the consumer.

Hunt.io safety analysts recognized the exercise after tracing suspicious VBScript downloads again to the vscode repository and linking them to the short-lived market itemizing.

The influence is critical, and the ultimate payload is OctoRAT, a full distant entry device deployed by way of an intermediate element referred to as the Anivia loader.

Collectively, they allow code execution, knowledge theft from browsers and wallets, and distant desktop management on developer techniques.

Regardless that the extension had solely a handful of installs, the targets are excessive worth, with entry to supply code and manufacturing techniques.

An infection chain and loader conduct

The an infection begins with a VBScript dropper that creates a random PowerShell file within the temp path and populates it with a Base64-encoded AES payload.

First-stage VBScript dropper initializing AES decryption (Supply – Hunt.io)

The script makes use of COM objects akin to WScript.Shell to run the loader with out consumer prompts. A simplified view of the persistence job later set by OctoRAT appears like:

schtasks.exe /create /tn “WindowsUpdate” /tr “” /sc minute /mo 1 /f

The PowerShell loader decrypts the embedded blob utilizing AES-256 in CBC mode and executes the end result straight in reminiscence.

Anivia then takes over, storing its encrypted payload in a byte array and utilizing a hard-coded key to decrypt a conveyable executable.

That payload is injected into the trusted vbc.exe course of by way of course of hollowing, which helps it keep away from widespread endpoint checks.

OctoRAT Heart login panel (Supply – Hunt.io)

From there, OctoRAT launches, units the WindowsUpdate job for repeat startup, and opens an encrypted command channel to attacker management servers.

This entire technical breakdown exhibits how one faux extension can ship a full intrusion in a couple of steps.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Anivia, Deploy, Extension, Loader, Malicious, OctoRAT, Threat, VSCode

Post navigation

Previous Post: India’s New SIM-Binding Rule for WhatsApp, Signal, Telegram, and Other Messaging Platforms
Next Post: Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware

Related Posts

Germany Urges Apple, Google to Block Chinese AI App DeepSeek Over Privacy Rules Germany Urges Apple, Google to Block Chinese AI App DeepSeek Over Privacy Rules Cyber Security News
10 Best NGINX Monitoring Tools 10 Best NGINX Monitoring Tools Cyber Security News
New Stealth Malware Campaign Targets Key Sectors New Stealth Malware Campaign Targets Key Sectors Cyber Security News
6000+ Vulnerable SmarterTools SmarterMail Servers Exposed to Actively Exploited RCE Vulnerability 6000+ Vulnerable SmarterTools SmarterMail Servers Exposed to Actively Exploited RCE Vulnerability Cyber Security News
Top 3 SOC Bottlenecks and How to Solve Them   Top 3 SOC Bottlenecks and How to Solve Them   Cyber Security News
Fired Techie Admits Hacking Employer’s Network in Retaliation for Termination Fired Techie Admits Hacking Employer’s Network in Retaliation for Termination Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark