5 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
A fake VS Code extension called "ClawdBot Agent" was found to be a trojan that installs malware on Windows machines without user interaction. Although it appeared legitimate, it secretly connected to a remote server to deliver malicious payloads. The investigation reveals sophisticated tactics and multiple layers of redundancy in the attack.
If you do, here's more
On January 27, 2026, a malicious VS Code extension named "ClawdBot Agent" was flagged by a malware detection system. Although it appeared to function as a legitimate AI coding assistant, it secretly installed malware on Windows machines as soon as VS Code was launched. The real Clawdbot team had never released an official extension, making this impersonation particularly deceptive. The extension was quickly reported to Microsoft, who removed it from their platform.
The extension's code revealed a clever activation mechanism, triggering malware downloads without user interaction. It used a JSON configuration file from a command-and-control server to execute malicious payloads, including a trojanized version of ScreenConnect software. When users installed the extension, it set up a remote access session with the attackersβ infrastructure. The malicious payloads included files that mimicked legitimate software, hiding their true nature from security tools. For redundancy, the attackers built in multiple delivery methods, including a DLL that could independently fetch malicious payloads from Dropbox if the primary server failed.
The article highlights the sophistication of this attack, emphasizing its layered approach to ensure persistence. The malicious actors employed techniques to bypass detection, such as using legitimate software components and clever coding practices. This incident underscores the increasing risks associated with popular software tools and the need for heightened vigilance when installing third-party extensions.
Questions about this article
No questions yet.