Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Orchid Security brings continuous identity observability to enterprise applications

LanzaTech aims for Humberside as sustainable aviation fuel facility

How early decisions shape incident response investigations

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Fake Moltbot AI coding assistant on VS Code marketplace drops malware
Identity

Fake Moltbot AI coding assistant on VS Code marketplace drops malware

userBy userJanuary 28, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly known as Clawdbot) on the official extension marketplace. The extension claims to be a free artificial intelligence (AI) coding assistant, but it secretly drops a malicious payload on compromised hosts.

The extension was named “ClawdBot Agent – AIcoding Assistant” (“clawdbot.clawdbot-agent”) and has since been removed by Microsoft. It was published on January 27, 2026 by a user named ‘clawdbot’.

Moltbot has grown significantly and has over 85,000 stars on GitHub at the time of writing. Created by Austrian developer Peter Steinberger, this open-source project allows users to run a personal AI assistant powered by large-scale language models (LLM) locally on their device and interact with it through existing communication platforms such as WhatsApp, Telegram, Slack, Discord, Google Chat, Signal, iMessage, Microsoft Teams, and WebChat.

The most important thing to note here is that Moltbot does not have a genuine VS Code extension. This means that the attackers behind the operation tried to take advantage of the tool’s growing popularity to trick unsuspecting developers into installing it.

cyber security

This malicious extension is designed to run automatically every time the integrated development environment (IDE) is launched and secretly retrieve a file named “config.json” from an external server (“clawdbot.getintwopc”).[.]site”) to run a binary named “Code.exe” that deploys legitimate remote desktop programs such as ConnectWise ScreenConnect.

The application then connects to the URL “meeting.bulletmailer”.[.]net:8041” allows the attacker persistent remote access to the compromised host.

“The attacker set up their own ScreenConnect relay server, generated a preconfigured client installer, and distributed it through a VS Code extension,” said Aikido researcher Charlie Eriksen. “Once a victim installs the extension, they receive a fully functional ScreenConnect client that instantly makes calls to the attacker’s infrastructure.”

Additionally, the extension includes a fallback mechanism that retrieves the DLLs listed in “config.json” and sideloads them to retrieve the same payload from Dropbox. A DLL (‘DWrite.dll’) written in Rust ensures that ScreenConnect clients are delivered even if the command and control (C2) infrastructure becomes inaccessible.

This is not the only backup mechanism built into the extension for payload delivery. The fake Moltbot extension also embeds a hard-coded URL to retrieve the executable file and sideloaded DLLs. The second alternative uses a batch script to retrieve the payload from another domain (‘darkgptprivate’).[.]com”).

Moltbot security risks

The disclosure comes after security researcher and Dvuln founder Jamison O’Reilly discovered hundreds of unauthorized Moltbot instances online, exposing configuration data, API keys, OAuth credentials, and private chat conversation history to unauthorized parties.

“The real issue is that Clawdbot agents have power of attorney,” O’Reilly explained. “You can send messages on behalf of users in Telegram, Slack, Discord, Signal, and WhatsApp. You can run tools and execute commands.”

This opens the door to scenarios where attackers can impersonate operators and access contacts, inject messages into ongoing conversations, modify agent responses, and exfiltrate sensitive data without their knowledge. More importantly, attackers can distribute backdoor Moltbot “skills” via MoltHub (formerly known as ClawdHub) to perform supply chain attacks and siphon sensitive data.

cyber security

Intruder said in a similar analysis that it observed widespread misconfigurations leading to credential leaks, prompt injection vulnerabilities, and compromised instances across multiple cloud providers.

“The core problem lies in the architecture: Clawdbot prioritizes ease of deployment over a secure configuration by default,” Intruder security engineer Benjamin Marr said in a statement. “Non-technical users can launch instances and integrate sensitive services without encountering security friction or validation. There are no mandatory firewall requirements, credential validation, and sandboxing of untrusted plugins.”

We recommend that users running Clawdbot in the default configuration audit their configuration, revoke all connected service integrations, review exposed credentials, implement network controls, and monitor for indicators of compromise.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNext-generation AI ‘swarms’ will infiltrate social media by imitating human behavior and harassing real users, researchers warn
Next Article Chrome adopts an AI browser with deeper Gemini integration and agent capabilities for autonomous tasks
user
  • Website

Related Posts

Orchid Security brings continuous identity observability to enterprise applications

February 4, 2026

How early decisions shape incident response investigations

February 4, 2026

Microsoft warns that Python Infostears is targeting macOS via fake ads and installers

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Orchid Security brings continuous identity observability to enterprise applications

LanzaTech aims for Humberside as sustainable aviation fuel facility

How early decisions shape incident response investigations

EU’s Destination Earth project enters phase 3

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.