Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto
Cybersecurity researchers have disclosed details of a malware campaign that's targeting software developers with a new information stealer called Evelyn Stealer by weaponizing the Microsoft Visual Studio Code (VS Code) extension ecosystem. "The malware is designed to exfiltrate sensitive information, including developer credentials and cryptocurrency-related data. Compromised developer
AI Analysis
Technical Summary
Evelyn Stealer is an information-stealing malware campaign that leverages malicious Visual Studio Code extensions to compromise developer environments. The attack begins with three identified malicious extensions—BigBlack.bitcoin-black, BigBlack.codo-ai, and BigBlack.mrbigblacktheme—that drop a downloader DLL named Lightshot.dll. This DLL executes a hidden PowerShell command to download and run a second-stage payload (runtime.exe). The runtime executable decrypts and injects the main stealer payload into the legitimate Windows process grpconv.exe, running entirely in memory to evade detection. The malware collects a wide range of sensitive data, including clipboard contents, installed applications, cryptocurrency wallets, running processes, desktop screenshots, stored Wi-Fi credentials, system information, and credentials and cookies from Google Chrome and Microsoft Edge browsers. To avoid detection and ensure data collection, it terminates active browser processes and relaunches them with command-line flags that disable GPU acceleration, sandboxing, extensions, logging, and UI elements, running the browser in a minimal, off-screen window. Data exfiltration is performed via FTP to a remote server (server09.mentality[.]cloud) in zipped archives. The malware also creates a mutex to prevent multiple instances from running simultaneously. This campaign specifically targets organizations with software development teams using VS Code and third-party extensions, especially those with access to production systems, cloud resources, or digital assets. The use of trusted VS Code extensions as an infection vector highlights a significant supply chain risk. The campaign reflects a growing trend of targeting developer ecosystems due to their privileged access and potential as gateways into broader organizational infrastructure. While no known exploits in the wild have been reported, the malware’s stealth and comprehensive data theft capabilities pose a serious threat to confidentiality and integrity of sensitive information.
Potential Impact
For European organizations, especially those with active software development teams using Visual Studio Code and third-party extensions, Evelyn Stealer represents a significant risk. The malware’s ability to steal developer credentials and cryptocurrency-related data can lead to unauthorized access to corporate networks, cloud environments, and production systems, potentially resulting in intellectual property theft, financial losses, and operational disruptions. The compromise of developer environments can facilitate further lateral movement within organizations, enabling attackers to deploy additional malware or conduct supply chain attacks. Organizations involved in fintech, blockchain, or cryptocurrency sectors are particularly vulnerable due to the targeted theft of crypto wallets. The stealthy nature of the malware, including in-memory execution and anti-analysis techniques, complicates detection and response efforts. Given the widespread use of VS Code across Europe, the threat could impact a broad range of industries, including technology, finance, and critical infrastructure. The exfiltration of sensitive data to attacker-controlled servers also raises concerns about data privacy and regulatory compliance under GDPR, potentially resulting in legal and reputational consequences.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to this threat. First, enforce strict controls on the installation of VS Code extensions by whitelisting only verified and necessary extensions, and regularly audit installed extensions for suspicious activity. Employ endpoint detection and response (EDR) solutions capable of detecting in-memory injection and unusual process behaviors, such as unexpected PowerShell commands and browser process terminations. Monitor network traffic for anomalous FTP connections or data exfiltration attempts, especially to suspicious domains like server09.mentality[.]cloud. Implement strong credential management practices, including multi-factor authentication (MFA) for developer accounts and cloud resources, to limit the impact of stolen credentials. Conduct regular security awareness training for developers emphasizing the risks of installing untrusted extensions. Utilize application control policies to restrict execution of unauthorized DLLs and executables. Employ sandboxing and behavioral analysis tools to detect and quarantine malicious extensions before deployment. Finally, maintain up-to-date backups and incident response plans specifically addressing supply chain and developer environment compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Poland
Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto
Description
Cybersecurity researchers have disclosed details of a malware campaign that's targeting software developers with a new information stealer called Evelyn Stealer by weaponizing the Microsoft Visual Studio Code (VS Code) extension ecosystem. "The malware is designed to exfiltrate sensitive information, including developer credentials and cryptocurrency-related data. Compromised developer
AI-Powered Analysis
Technical Analysis
Evelyn Stealer is an information-stealing malware campaign that leverages malicious Visual Studio Code extensions to compromise developer environments. The attack begins with three identified malicious extensions—BigBlack.bitcoin-black, BigBlack.codo-ai, and BigBlack.mrbigblacktheme—that drop a downloader DLL named Lightshot.dll. This DLL executes a hidden PowerShell command to download and run a second-stage payload (runtime.exe). The runtime executable decrypts and injects the main stealer payload into the legitimate Windows process grpconv.exe, running entirely in memory to evade detection. The malware collects a wide range of sensitive data, including clipboard contents, installed applications, cryptocurrency wallets, running processes, desktop screenshots, stored Wi-Fi credentials, system information, and credentials and cookies from Google Chrome and Microsoft Edge browsers. To avoid detection and ensure data collection, it terminates active browser processes and relaunches them with command-line flags that disable GPU acceleration, sandboxing, extensions, logging, and UI elements, running the browser in a minimal, off-screen window. Data exfiltration is performed via FTP to a remote server (server09.mentality[.]cloud) in zipped archives. The malware also creates a mutex to prevent multiple instances from running simultaneously. This campaign specifically targets organizations with software development teams using VS Code and third-party extensions, especially those with access to production systems, cloud resources, or digital assets. The use of trusted VS Code extensions as an infection vector highlights a significant supply chain risk. The campaign reflects a growing trend of targeting developer ecosystems due to their privileged access and potential as gateways into broader organizational infrastructure. While no known exploits in the wild have been reported, the malware’s stealth and comprehensive data theft capabilities pose a serious threat to confidentiality and integrity of sensitive information.
Potential Impact
For European organizations, especially those with active software development teams using Visual Studio Code and third-party extensions, Evelyn Stealer represents a significant risk. The malware’s ability to steal developer credentials and cryptocurrency-related data can lead to unauthorized access to corporate networks, cloud environments, and production systems, potentially resulting in intellectual property theft, financial losses, and operational disruptions. The compromise of developer environments can facilitate further lateral movement within organizations, enabling attackers to deploy additional malware or conduct supply chain attacks. Organizations involved in fintech, blockchain, or cryptocurrency sectors are particularly vulnerable due to the targeted theft of crypto wallets. The stealthy nature of the malware, including in-memory execution and anti-analysis techniques, complicates detection and response efforts. Given the widespread use of VS Code across Europe, the threat could impact a broad range of industries, including technology, finance, and critical infrastructure. The exfiltration of sensitive data to attacker-controlled servers also raises concerns about data privacy and regulatory compliance under GDPR, potentially resulting in legal and reputational consequences.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to this threat. First, enforce strict controls on the installation of VS Code extensions by whitelisting only verified and necessary extensions, and regularly audit installed extensions for suspicious activity. Employ endpoint detection and response (EDR) solutions capable of detecting in-memory injection and unusual process behaviors, such as unexpected PowerShell commands and browser process terminations. Monitor network traffic for anomalous FTP connections or data exfiltration attempts, especially to suspicious domains like server09.mentality[.]cloud. Implement strong credential management practices, including multi-factor authentication (MFA) for developer accounts and cloud resources, to limit the impact of stolen credentials. Conduct regular security awareness training for developers emphasizing the risks of installing untrusted extensions. Utilize application control policies to restrict execution of unauthorized DLLs and executables. Employ sandboxing and behavioral analysis tools to detect and quarantine malicious extensions before deployment. Finally, maintain up-to-date backups and incident response plans specifically addressing supply chain and developer environment compromises.
Affected Countries
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/01/evelyn-stealer-malware-abuses-vs-code.html","fetched":true,"fetchedAt":"2026-01-21T03:06:10.207Z","wordCount":1115}
Threat ID: 697042a44623b1157c81b94f
Added to database: 1/21/2026, 3:06:12 AM
Last enriched: 1/21/2026, 3:07:40 AM
Last updated: 2/7/2026, 8:04:55 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-06
MediumThreatFox IOCs for 2026-02-05
MediumTechnical Analysis of Marco Stealer
MediumNew Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
MediumKnife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.