Evelyn Stealer Targets VS Code to Steal Credentials

Evelyn Stealer Targets VS Code

Cybersecurity experts uncovered a dangerous new threat. Evelyn Stealer targets VS Code extensions to steal developer credentials and crypto. It hits software developers hard. Therefore, attackers gain access to valuable company systems.

How Attackers Hide in VS Code

Hackers publish fake extensions in the marketplace. These extensions look useful at first. For example, they promise themes, AI tools, or bitcoin features. However, they secretly drop a malicious file.

The bad file acts as a downloader. It launches hidden commands quietly. Next, it fetches the main stealer program. As a result, everything runs without obvious signs.

The Stealer Grabs Sensitive Data

The main payload injects itself into a normal Windows process. It works directly in memory to stay hidden. Therefore, it collects a lot of private information fast.

It grabs clipboard text and running apps. Moreover, it steals cryptocurrency wallet details. For instance, it takes desktop screenshots and Wi-Fi passwords. It also pulls saved logins from popular browsers.

Sneaky Tricks to Avoid

The malware checks for virtual machines and analysis tools. It kills open browser windows first. Then, it restarts browsers with special flags. These flags hide the window completely.

For example, it uses headless mode and tiny window size. It disables security features too. As a result, the browser opens off-screen and silently. This lets the stealer grab cookies and credentials easily.

Attackers add a mutex to run only one copy. This prevents crashes from multiple instances. However, the malware still sends stolen data over the internet. It packs everything into a ZIP file and uploads via FTP.

The campaign focuses on development teams. These teams often control cloud resources and production servers. Therefore, one infected developer can open doors for bigger attacks.

Similar Threats Keep Growing

New stealers appear often now. Some use Python code for better stealth. For instance, one family works on both Windows and macOS. Another sends data through trusted chat platforms.

These tools avoid quick destruction. Instead, they focus on long-term access. As a result, attackers watch user activity quietly over time.

Stolen credentials unlock company networks. Crypto wallets lose funds fast. Moreover, attackers move deeper into systems. They steal code, secrets, or customer data next. This shows developers face high risks. Their tools and access make them prime targets. Therefore, everyone needs stronger defenses today.

How to Prevent Evelyn Stealer Attacks

Only install VS Code extensions from trusted publishers. Check reviews and update history carefully before adding any extension. Avoid suspicious themes or tools promising unusual features.

Use real-time endpoint monitoring to spot hidden processes and unusual network traffic early. Enable behavior-based alerts for PowerShell activity and file injections. Regular scans catch injected code in legitimate programs fast. Combine strict extension vetting with continuous device protection. Therefore, you block stealers before they grab credentials or crypto assets.

Sleep well, we got you covered.

Scroll to Top