Close Menu
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
X (Twitter) Instagram Threads LinkedIn WhatsApp
Trending
  • 3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk
  • ClawdBot AI (Moltbot) Security Risks: Autonomous AI Agent Threats
  • Fake Moltbot VS Code Extension Malware Found in Marketplace Attack
  • Meta Premium Subscriptions: Instagram, Facebook & WhatsApp AI Plans
  • Malicious Chrome Extensions Driving Chrome Web Store Phishing
  • Windows 11 Boot Failure January 2026 Update: Microsoft Investigates
  • Cybersecurity Weekly Report: Jan 18-24 Threats
  • 149 Million Passwords Exposed Online in Massive Infostealer Malware Leak
Monday, February 2
Cyber infosCyber infos
X (Twitter) Instagram LinkedIn WhatsApp
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
Cyber infosCyber infos
Cyber attacks

Fake Moltbot VS Code Extension Malware Found in Marketplace Attack

Cyber infosBy Cyber infosJanuary 29, 2026No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Email WhatsApp Copy Link
Follow Us
X (Twitter) Instagram LinkedIn WhatsApp Telegram Threads
Share
Facebook Twitter Pinterest Threads Copy Link

The discovery of a new malicious VS Code extension is another reminder that developer tools especially AI-driven ones are increasingly being abused by attackers. Security researchers recently uncovered a fake Moltbot VS Code extension malware campaign that made its way into Microsoft’s official Visual Studio Code Marketplace, quietly turning a supposed AI coding assistant into a backdoor.

At first glance, the extension appeared to be tied to Moltbot, also known as Clawdbot, and promised developers a free AI-powered coding experience. In reality, the Moltbot AI coding assistant malware installed a remote access component that allowed attackers to maintain long-term control over infected machines. Although Microsoft has removed the extension, the incident raises serious concerns about how much trust developers place in official extension marketplaces.

Table of Contents hide
1 Turning Moltbot’s Popularity Into a VS Code Marketplace Supply Chain Attack
2 How the Malicious VS Code Extension Operates Behind the Scenes
3 Multiple Backup Channels Ensure the Payload Is Delivered
4 Why Moltbot Deployments Carry Broader Security Risks
5 Structural Weaknesses and Misconfigurations
6 What Developers Should Do Next
7 Final Thoughts

Turning Moltbot’s Popularity Into a VS Code Marketplace Supply Chain Attack

Moltbot’s rapid rise made it an easy target. The open-source project recently surpassed 85,000 stars on GitHub, attracting developers interested in running local AI agents. Built by Austrian developer Peter Steinberger, Moltbot allows users to operate a personal AI assistant and connect it with services such as WhatsApp, Telegram, Slack, Discord, Signal, Microsoft Teams, and iMessage.

What’s critical to understand is that Moltbot does not have an official Visual Studio Code extension. Attackers exploited that absence by publishing a fake extension called “ClawdBot Agent – AI Coding Assistant” (clawdbot.clawdbot-agent) on January 27, 2026. By copying familiar branding and positioning it as a productivity tool, the attackers successfully carried out a VS Code Marketplace supply chain attack without raising immediate suspicion.

This tactic reflects a broader trend: attackers increasingly impersonate popular open-source projects to reach highly trusted development environments.

How the Malicious VS Code Extension Operates Behind the Scenes

Once installed, the Clawdbot VS Code malware embeds itself into the normal development workflow. It automatically executes every time Visual Studio Code starts, ensuring persistence without requiring any additional user interaction.

The extension reaches out to an external server (clawdbot.getintwopc[.]site) to download a config.json file that dictates the next stage of execution. That configuration launches Code.exe, which installs ConnectWise ScreenConnect, a legitimate remote desktop tool widely used by IT support teams.

From a defender’s perspective, this is particularly dangerous. Because ScreenConnect is trusted software, its presence often doesn’t trigger alarms. Once installed, the client connects to meeting.bulletmailer[.]net:8041, silently granting attackers full remote access. This allows the malicious VS Code extension to remain hidden while blending into normal administrative traffic.

Security researcher Charlie Eriksen from Aikido noted that the attackers even operated their own ScreenConnect relay infrastructure, making the compromise immediate and reliable.

Fake Moltbot VS Code Extension Malware Found in Marketplace Attack

Multiple Backup Channels Ensure the Payload Is Delivered

The fake Moltbot VS Code extension malware was clearly built to survive takedowns. If its primary infrastructure goes offline, it seamlessly switches to alternate delivery methods.

One fallback involves downloading a Rust-based malicious DLL called DWrite.dll, which sideloads the ScreenConnect payload from Dropbox. The extension also contains hard-coded URLs that allow it to retrieve both the executable and the DLL directly. A separate backup mechanism uses a batch script to fetch the same payloads from darkgptprivate[.]com.

These layers of redundancy make the VS Code Marketplace supply chain attack far more resilient than typical malware campaigns.

Why Moltbot Deployments Carry Broader Security Risks

This incident also shines a light on wider security concerns around Moltbot itself. Security researcher Jamieson O’Reilly, founder of Dvuln, recently identified hundreds of Moltbot instances exposed online without authentication.

These exposed deployments leaked configuration files, API keys, OAuth credentials, and private conversation histories. Because Moltbot agents are designed to act on behalf of users, this dramatically raises the potential impact of compromise.

As O’Reilly explained, Clawdbot agents can send messages, execute commands, and impersonate users across multiple communication platforms—making them an attractive target for attackers.

In a worst-case scenario, a malicious Moltbot skill distributed through MoltHub could enable large-scale supply chain attacks without users realizing anything is wrong.

Structural Weaknesses and Misconfigurations

Additional research from security firm Intruder revealed widespread misconfigurations across Moltbot deployments in various cloud environments. Their findings included exposed credentials, prompt injection vulnerabilities, and publicly accessible instances with little or no access control.

According to Intruder security engineer Benjamin Marr, these issues stem from design choices. Moltbot emphasizes ease of deployment over secure-by-default configurations, offering no enforced firewall rules, credential validation, or sandboxing for untrusted plugins. While this lowers the barrier to entry, it also lowers the barrier for attackers.

What Developers Should Do Next

To reduce the risk of Clawdbot VS Code malware, If you use Moltbot or similar AI agents:

  • Do not install unofficial IDE extensions claiming to support Moltbot or Clawdbot
  • Audit all Moltbot configurations immediately
  • Revoke and rotate API keys, OAuth tokens, and credentials
  • Restrict network exposure using firewalls and access controls
  • Monitor for remote access tools like ScreenConnect on developer machines
  • Treat AI plugins and “skills” as untrusted code

For extension marketplaces, this incident underscores the urgent need for stricter publisher verification, behavioral scanning, and runtime telemetry.

Final Thoughts

The fake Moltbot VS Code extension malware campaign highlights how easily attackers can blend into trusted developer ecosystems. By abusing popular branding, legitimate software, and official marketplaces, they can compromise systems without drawing immediate attention.

As AI assistants become more deeply integrated into development workflows, VS Code Marketplace supply chain attacks are likely to increase. In this environment, convenience often comes at a hidden cost.

Sometimes, the most dangerous threats don’t look malicious at all—they look helpful.

Follow on X (Twitter) Follow on Instagram Follow on LinkedIn Follow on WhatsApp Follow on Threads
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleMeta Premium Subscriptions: Instagram, Facebook & WhatsApp AI Plans
Next Article ClawdBot AI (Moltbot) Security Risks: Autonomous AI Agent Threats
Cyber infos
  • Website

Related Posts

3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk

January 30, 2026
Read More

ClawdBot AI (Moltbot) Security Risks: Autonomous AI Agent Threats

January 30, 2026
Read More

Malicious Chrome Extensions Driving Chrome Web Store Phishing

January 27, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber news

3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk

January 30, 2026

ClawdBot AI (Moltbot) Security Risks: Autonomous AI Agent Threats

January 30, 2026

Windows 11 Boot Failure January 2026 Update: Microsoft Investigates

January 26, 2026

149 Million Passwords Exposed Online in Massive Infostealer Malware Leak

January 25, 2026

Top 10

Top 10 Cybersecurity Resolutions Every User Should Make in 2026

January 1, 2026

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

mobile security

Google Is Finally Letting Users Change Gmail Address – Here’s How It Works

December 26, 2025

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Archives
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk

January 30, 2026

ClawdBot AI (Moltbot) Security Risks: Autonomous AI Agent Threats

January 30, 2026

Fake Moltbot VS Code Extension Malware Found in Marketplace Attack

January 29, 2026

Meta Premium Subscriptions: Instagram, Facebook & WhatsApp AI Plans

January 28, 2026

Malicious Chrome Extensions Driving Chrome Web Store Phishing

January 27, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

We delivers trusted cybersecurity updates, expert analysis, and online safety tips. We help individuals and businesses understand cyber threats and protect their digital world with accurate, easy-to-read information.

Partners
White Hat Hub Partner
X (Twitter) Instagram Pinterest LinkedIn WhatsApp Threads
  • Contact us
  • Sitemaps
© 2026 Cyberinfos - All Rights are Reserved

Type above and press Enter to search. Press Esc to cancel.