Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto

The Hacker News by The Hacker News
January 20, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Ravie LakshmananJan 20, 2026Cloud Security / Developer Security

Cybersecurity researchers have disclosed details of a malware campaign that’s targeting software developers with a new information stealer called Evelyn Stealer by weaponizing the Microsoft Visual Studio Code (VS Code) extension ecosystem.

“The malware is designed to exfiltrate sensitive information, including developer credentials and cryptocurrency-related data. Compromised developer environments can also be abused as access points into broader organizational systems,” Trend Micro said in an analysis published Monday.

The activity is designed to single out organizations with software development teams that rely on VS Code and third-party extensions, along with those with access to production systems, cloud resources, or digital assets, it added.

It’s worth noting that details of the campaign were first documented by Koi Security last month, when details emerged of three VS Code extensions – BigBlack.bitcoin-black, BigBlack.codo-ai, and BigBlack.mrbigblacktheme – that ultimately dropped a malicious downloader DLL (“Lightshot.dll”) responsible for launching a hidden PowerShell command to fetch and execute a second-stage payload (“runtime.exe”).

Cybersecurity

The executable, for its part, decrypts and injects the main stealer payload into a legitimate Windows process (“grpconv.exe”) directly in memory, allowing it to harvest sensitive data and exfiltrate it to a remote server (“server09.mentality[.]cloud”) over FTP in the form of a ZIP file. Some of the information collected by the malware includes –

  • Clipboard content
  • Installed apps
  • Cryptocurrency wallets
  • Running processes
  • Desktop screenshots
  • Stored Wi-Fi credentials
  • System information
  • Credentials and stored cookies from Google Chrome and Microsoft Edge

In addition, it implements safeguards to detect analysis and virtual environments and takes steps to terminate active browser processes to ensure a seamless data collection process and prevent any potential interference when attempting to extract cookies and credentials.

This is achieved by launching the browser via the command line by setting the following flags for detection and forensic traces –

  • –headless=new, to run in headless mode
  • –disable-gpu, to prevent GPU acceleration
  • –no-sandbox, to disable browser security sandbox
  • –disable-extensions, to prevent legitimate security extensions from interfering
  • –disable-logging, to disable browser log generation
  • –silent-launch, to suppress startup notifications
  • –no-first-run, to bypass initial setup dialogs
  • –disable-popup-blocking, to ensure malicious content can execute
  • –window-position=-10000,-10000, to position the window off-screen
  • –window-size=1,1, to minimize window to 1×1 pixel
Cybersecurity

“The [DLL] downloader creates a mutual exclusion (mutex) object to ensure that only one instance of the malware can run at any given time, ensuring that multiple instances of the malware cannot be executed on a compromised host,” Trend Micro said. “The Evelyn Stealer campaign reflects the operationalization of attacks against developer communities, which are seen as high-value targets given their important role in the software development ecosystem.”

The disclosure coincides with the emergence of two new Python-based stealer malware families referred to as MonetaStealer and SolyxImmortal, with the former also capable of targeting Apple macOS systems to enable comprehensive data theft.

“[SolyxImmortal] leverages legitimate system APIs and widely available third-party libraries to extract sensitive user data and exfiltrate it to attacker-controlled Discord webhooks,” CYFIRMA said.

“Its design emphasizes stealth, reliability, and long-term access rather than rapid execution or destructive behaviour. By operating entirely in user space and relying on trusted platforms for command-and-control, the malware reduces its likelihood of immediate detection while maintaining persistent visibility into user activity.



Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
The Hidden Risk of Orphan Accounts

The Hidden Risk of Orphan Accounts

Recommended.

‘Change Is Scary’: Overhaul Of ‘Best-In-Class’ Cisco Partner Program Triggers Channel Anxiety

‘Change Is Scary’: Overhaul Of ‘Best-In-Class’ Cisco Partner Program Triggers Channel Anxiety

June 19, 2025
Colt DCS Publishes 2024 Sustainability Highlights Report

Colt DCS Publishes 2024 Sustainability Highlights Report

June 24, 2025

Trending.

Spirit of openness helps banks get serious about stopping scams | Computer Weekly

Spirit of openness helps banks get serious about stopping scams | Computer Weekly

April 10, 2025
Microsoft Q3 Earnings Preview: What To Watch On Azure, Copilot, OpenAI

Microsoft Q3 Earnings Preview: What To Watch On Azure, Copilot, OpenAI

April 29, 2026
Weibo Publishes 2025 Environmental, Social and Governance Report

Weibo Publishes 2025 Environmental, Social and Governance Report

April 28, 2026
It Takes 2 Minutes to Hack the EU’s New Age-Verification App

It Takes 2 Minutes to Hack the EU’s New Age-Verification App

April 18, 2026
Chunghwa Telecom 2025 Form 20-F filed with the U.S. SEC

Chunghwa Telecom 2025 Form 20-F filed with the U.S. SEC

April 15, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio