Fake ClawdBot VS Code Extension Deploys ScreenConnect RAT on Developer Machines

Fake ClawdBot VS Code Extension Deploys ScreenConnect RAT on Developer Machines

Security researchers at Aikido Security have discovered a malicious Visual Studio Code extension masquerading as "ClawdBot Agent," a fake version of the popular AI coding assistant. The extension functions as a fully working AI tool while silently deploying remote access malware to Windows machines.

The real ClawdBot team never published an official VS Code extension—attackers simply claimed the name first.

How the Attack Works

The malicious extension appears legitimate, featuring a professional icon, polished UI, and integration with seven AI providers including OpenAI, Anthropic, and Google. The AI features actually work, giving users no immediate reason for suspicion.

The trojan activates automatically when VS Code starts, requiring no user interaction:

json

{
  "activationEvents": ["onStartupFinished"]
}
```

Upon activation, the extension contacts a command and control server at `clawdbot.getintwopc[.]site` to fetch configuration and download payloads. If the primary C2 fails, hardcoded fallback URLs and a secondary domain at `darkgptprivate[.]com` ensure payload delivery.

**The Payload: Weaponized ScreenConnect**

Rather than deploying custom malware, the attackers distribute a pre-configured ConnectWise ScreenConnect client—legitimate remote management software configured to connect to attacker infrastructure at `meeting.bulletmailer[.]net:8041`.

This technique, known as "Bring Your Own ScreenConnect," is increasingly popular because:

- ScreenConnect is trusted IT software that security tools often allow
- The binary itself is legitimate and properly signed
- A `Code.exe` process on a developer's machine raises no suspicion

The payload installs to `C:\Program Files (x86)\ScreenConnect Client\` and immediately establishes a remote access session with the attacker's relay server.

**Redundant Delivery Mechanisms**

The attackers built three layers of payload delivery:

1. **Dynamic configuration** fetched from the C2 server
2. **JavaScript fallback** with hardcoded URLs if config fails
3. **PowerShell batch script** using an alternate domain

A Rust-based `DWrite.dll` provides additional redundancy through DLL sideloading, capable of independently fetching payloads from Dropbox disguised as a Zoom update.

**Quadruple Brand Impersonation**

The attack layers multiple trusted brands:
- **ClawdBot** (the extension name)
- **VS Code** (payload named `Code.exe`)
- **Lightshot** (staging folder in %TEMP%)
- **Zoom** (Dropbox payload named `zoomupdate.msi`)

**Infrastructure**

- `clawdbot.getintwopc[.]site` – Primary C2, behind Cloudflare
- `darkgptprivate[.]com` – Secondary C2, resolves to 178.16.54[.]253 (Seychelles hosting)
- `meeting.bulletmailer[.]net:8041` – ScreenConnect relay server
- Dropbox link hosting redundant payload

**Indicators of Compromise**

**Network:**
```
meeting.bulletmailer[.]net:8041
179.43.176[.]32
clawdbot.getintwopc[.]site
darkgptprivate[.]com
178.16.54[.]253
```

**File Hashes (SHA-256):**
```
Code.exe: e20b920c7af988aa215c95bbaa365d005dd673544ab7e3577b60fecf11dcdea2
DWrite.dll: d1e0c26774cb8beabaf64f119652719f673fb530368d5b2166178191ad5fcbea
extension.js: adbcdb613c04fd51936cb0863d2417604db0cd04792ab7cae02526d48944c77b

Remediation

If you installed the "ClawdBot Agent" extension:

  1. Uninstall the extension from VS Code immediately
  2. Remove ScreenConnect from C:\Program Files (x86)\ScreenConnect Client (083e4d30c7ea44f7)\
  3. Delete %TEMP%\Lightshot folder
  4. Block the listed network IOCs at your firewall
  5. Rotate any API keys entered into the extension
  6. Run a full antivirus scan
  7. Monitor for outbound connections to port 8041

Microsoft removed the extension following Aikido's report.

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire