A new information-stealing malware campaign known as Evelyn Stealer has been identified targeting software developers through malicious Visual Studio Code (VS Code) extensions. Threat actors distributed trojanized extensions disguised as legitimate themes or productivity tools. Once installed, these extensions silently execute malicious code that downloads and deploys a multi-stage payload on the victim’s system. The malware ultimately injects itself into trusted Windows processes to evade detection and begins harvesting sensitive information. Stolen data includes browser credentials, session cookies, cryptocurrency wallets, system details, clipboard data, and screenshots, all of which are exfiltrated to attacker-controlled infrastructure. This campaign is particularly concerning because it exploits the trusted VS Code extension ecosystem, which is widely used by developers across industries. By compromising developer environments, attackers can gain indirect access to source code repositories, cloud credentials, CI CD pipelines, and enterprise networks, creating a potential supply-chain risk. Evelyn Stealer also demonstrates advanced stealth techniques, including in-memory execution, process injection, and sandbox evasion, making detection difficult for traditional security tools. The abuse of legitimate developer tooling significantly increases the likelihood of successful infections. Organizations and developers should strictly control and audit VS Code extensions, installing only those from verified publishers. Extension installation policies should be enforced in corporate environments, especially on systems with access to sensitive resources. Endpoint monitoring should be enhanced to detect abnormal PowerShell activity, suspicious DLL loading, and unauthorized outbound connections. Developers should also use multi-factor authentication, regularly rotate credentials, and avoid storing secrets locally. Continuous security awareness and proactive monitoring are critical to mitigating this emerging threat.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...