Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Softbank’s sale of NVIDIA causes market confusion and questions arise

WhatsApp malware ‘Maverick’ hijacks browser sessions and targets Brazil’s largest banks

Threads targets podcasters with new features and aims to become a hub for show discussions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious VSX extension ‘SleepyDuck’ uses Ethereum to keep command server alive
Identity

Malicious VSX extension ‘SleepyDuck’ uses Ethereum to keep command server alive

userBy userNovember 3, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 3, 2025Ravi LakshmananCryptocurrency/Threat Intelligence

Cybersecurity researchers have flagged a new malicious extension in the Open VSX registry that harbors a remote access Trojan called SleepyDuck.

According to John Tuckner of Secure Annex, the extension in question, juan-bianco.solidity-vlang (version 0.0.7), was first published as a completely benign library on October 31, 2025, then reached 14,000 downloads before being updated to version 0.0.8 with new malicious functionality on November 1.

“The malware includes sandbox evasion techniques and leverages Ethereum contracts to update command and control addresses in case the original address is deleted,” Tuckner added.

We have repeatedly detected campaigns targeting Solidity developers distributing malicious extensions on both the Visual Studio Extension Marketplace and Open VSX. In July 2025, Kaspersky revealed that a Russian developer lost $500,000 in cryptocurrency assets after installing such an extension through Cursor.

DFIR retainer service

In the latest case detected by an enterprise extension security company, the malware is triggered when a new code editor window is opened or a .sol file is selected.

Specifically, it is configured to find the fastest Ethereum remote procedure call (RPC) provider to connect to in order to gain access to the blockchain and initiate a connection with “sleepyduck”‘s remote server.[.]xyz” (as it is named) via the contract address “0xDAfb81732db454DA238e9cFC9A9Fe5fb8e34c465” and starts a polling loop that checks every 30 seconds for new commands to be executed on the host.

It can also collect system information such as hostname, username, MAC address, time zone, etc. and leak the details to servers. If the domain is occupied or deleted, the malware has built-in fallback controls and accesses a predefined list of Ethereum RPC addresses to extract contract information that can hold server details.

In addition, this extension has the ability to reach new configurations from contract addresses to set up new servers, as well as run emergency commands against all endpoints in case of unexpected events. The contract was created on October 31, 2025, and the attacker updated the server details from “localhost:8080” to “sleepyduck.”[.]xyz” will be executed over four transactions.

It is unclear whether the attackers artificially inflated the download numbers to increase the extension’s relevance in search results. This is a tactic often employed to increase popularity by tricking unsuspecting developers into installing malicious libraries.

This development comes at the same time that the company also revealed details of another set of five extensions, this time published on the VS Code Extension Marketplace by a user named “developmentinc.” It includes a Pokemon-themed library (‘mock1’) that downloads a batch script miner from an external server.[.]su:443″) is installed or enabled, run the miner using “cmd.exe”.

The script file uses PowerShell to restart itself with administrator privileges, add all drive letters from C: to Z: and configure Microsoft Defender Antivirus exclusions, as well as download the Monero mining executable from ‘mock1’.[.]Run “su”.

CIS build kit

Extensions uploaded by threat actors are no longer available for download, but are listed below.

Development Co., Ltd. cfx-lua-vs Development Co., Ltd. Pokemon Development Co., Ltd. Trizon-vs Development Co., Ltd. Minecraft Snippet Development Co., Ltd. kombai-vs

Users are advised to be careful when downloading extensions and ensure that they are from reputable publishers. Microsoft announced in June that it would begin regular market-wide scans to protect users from malware. All extensions that have been removed from the official marketplace can be found on the RemovedPackages page on GitHub.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhat are the signs that nature is telling us? Scientists are triggering earthquakes in the Alps to find out what happens before they occur
Next Article Waymo’s robotaxis expansion accelerates in three new cities
user
  • Website

Related Posts

WhatsApp malware ‘Maverick’ hijacks browser sessions and targets Brazil’s largest banks

November 11, 2025

GootLoader is back, uses new font tricks to hide malware on WordPress sites

November 11, 2025

CISO’s expert guide to AI supply chain attacks

November 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Softbank’s sale of NVIDIA causes market confusion and questions arise

WhatsApp malware ‘Maverick’ hijacks browser sessions and targets Brazil’s largest banks

Threads targets podcasters with new features and aims to become a hub for show discussions

Immortal startup Eternos wins $10.3 million as it pivots to personal AI that sounds like you

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.