Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto

Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto

Posted on January 20, 2026January 20, 2026 By CWS

Ravie LakshmananJan 20, 2026Cloud Safety / Developer Safety
Cybersecurity researchers have disclosed particulars of a malware marketing campaign that is concentrating on software program builders with a brand new data stealer referred to as Evelyn Stealer by weaponizing the Microsoft Visible Studio Code (VS Code) extension ecosystem.
“The malware is designed to exfiltrate delicate data, together with developer credentials and cryptocurrency-related knowledge. Compromised developer environments can be abused as entry factors into broader organizational methods,” Pattern Micro mentioned in an evaluation revealed Monday.
The exercise is designed to single out organizations with software program growth groups that depend on VS Code and third-party extensions, together with these with entry to manufacturing methods, cloud assets, or digital belongings, it added.
It is value noting that particulars of the marketing campaign had been first documented by Koi Safety final month, when particulars emerged of three VS Code extensions – BigBlack.bitcoin-black, BigBlack.codo-ai, and BigBlack.mrbigblacktheme – that in the end dropped a malicious downloader DLL (“Lightshot.dll”) accountable for launching a hidden PowerShell command to fetch and execute a second-stage payload (“runtime.exe”).

The executable, for its half, decrypts and injects the primary stealer payload right into a authentic Home windows course of (“grpconv.exe”) instantly in reminiscence, permitting it to reap delicate knowledge and exfiltrate it to a distant server (“server09.mentality[.]cloud”) over FTP within the type of a ZIP file. Among the data collected by the malware consists of –

Clipboard content material
Put in apps
Cryptocurrency wallets
Working processes
Desktop screenshots
Saved Wi-Fi credentials
System data
Credentials and saved cookies from Google Chrome and Microsoft Edge

As well as, it implements safeguards to detect evaluation and digital environments and takes steps to terminate energetic browser processes to make sure a seamless knowledge assortment course of and stop any potential interference when trying to extract cookies and credentials.

That is achieved by launching the browser by way of the command line by setting the next flags for detection and forensic traces –

–headless=new, to run in headless mode
–disable-gpu, to forestall GPU acceleration
–no-sandbox, to disable browser safety sandbox
–disable-extensions, to forestall authentic safety extensions from interfering
–disable-logging, to disable browser log era
–silent-launch, to suppress startup notifications
–no-first-run, to bypass preliminary setup dialogs
–disable-popup-blocking, to make sure malicious content material can execute
–window-position=-10000,-10000, to place the window off-screen
–window-size=1,1, to reduce window to 1×1 pixel

“The [DLL] downloader creates a mutual exclusion (mutex) object to make sure that just one occasion of the malware can run at any given time, making certain that a number of situations of the malware can’t be executed on a compromised host,” Pattern Micro mentioned. “The Evelyn Stealer marketing campaign displays the operationalization of assaults towards developer communities, that are seen as high-value targets given their essential function within the software program growth ecosystem.”
The disclosure coincides with the emergence of two new Python-based stealer malware households known as MonetaStealer and SolyxImmortal, with the previous additionally able to concentrating on Apple macOS methods to allow complete knowledge theft.
“[SolyxImmortal] leverages authentic system APIs and extensively accessible third-party libraries to extract delicate consumer knowledge and exfiltrate it to attacker-controlled Discord webhooks,” CYFIRMA mentioned.
“Its design emphasizes stealth, reliability, and long-term entry fairly than speedy execution or damaging behaviour. By working completely in consumer house and counting on trusted platforms for command-and-control, the malware reduces its probability of instant detection whereas sustaining persistent visibility into consumer exercise.

The Hacker News Tags:Abuses, Code, Credentials, Crypto, Developer, Evelyn, Extensions, Malware, Steal, Stealer

Post navigation

Previous Post: Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers
Next Post: The Hidden Risk of Orphan Accounts

Related Posts

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover The Hacker News
Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild The Hacker News
CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw The Hacker News
Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data The Hacker News
Scattered Spider Resurfaces With Financial Sector Attacks Despite Retirement Claims Scattered Spider Resurfaces With Financial Sector Attacks Despite Retirement Claims The Hacker News
Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News