Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the official Extension Marketplace that claims to be a free artificial intelligence (AI) coding assistant, but stealthily drops a malicious payload on compromised hosts. The extension, named "ClawdBot Agent - AI Coding Assistant" ("clawdbot.clawdbot-agent")
AI Analysis
Technical Summary
The malicious VS Code extension named "ClawdBot Agent - AI Coding Assistant" masqueraded as a legitimate AI coding assistant related to the open-source Moltbot project, which itself does not have an official VS Code extension. Published on January 27, 2026, by an attacker-controlled account, the extension was designed to execute automatically upon IDE startup. It stealthily downloaded a "config.json" file from a malicious domain (clawdbot.getintwopc[.]site), which contained instructions to execute a binary named "Code.exe." This binary deployed a legitimate remote desktop software, ConnectWise ScreenConnect, configured to connect to an attacker-controlled relay server (meeting.bulletmailer[.]net:8041), granting persistent remote access to the infected machine. To ensure resilience, the extension included fallback mechanisms such as sideloading a Rust-written DLL named "DWrite.dll" from Dropbox and using batch scripts to retrieve payloads from an alternate domain (darkgptprivate[.]com). These redundancies ensured payload delivery even if primary C2 servers were taken down. The attackers leveraged the popularity of Moltbot, an AI assistant enabling local LLM interactions over multiple messaging platforms, to deceive developers into installing the malicious extension. Beyond the extension, researchers discovered that many Moltbot instances were misconfigured, exposing sensitive data like API keys, OAuth credentials, and private chat histories. Since Moltbot agents can send messages and execute commands on behalf of users across platforms like Telegram, Slack, Discord, and WhatsApp, compromised instances could be used to impersonate users, inject malicious messages, exfiltrate data, and distribute backdoored plugins via MoltHub, enabling supply chain attacks. The root cause is Moltbot's architecture prioritizing ease of deployment over security, lacking enforced firewall rules, credential validation, and sandboxing, which facilitates widespread misconfigurations and compromises across cloud providers. Microsoft has removed the malicious extension from the marketplace, but the threat underscores risks in open-source AI tooling ecosystems and supply chain security.
Potential Impact
European organizations, particularly software development firms and enterprises relying on Visual Studio Code and AI-assisted coding tools, face significant risks from this threat. The malicious extension enables attackers to gain persistent remote access to developer workstations, potentially leading to intellectual property theft, insertion of malicious code into software projects, and lateral movement within corporate networks. The stealthy nature of the payload delivery and fallback mechanisms complicate detection and remediation efforts. Furthermore, compromised Moltbot instances can lead to unauthorized access to sensitive communications and credentials across multiple messaging platforms widely used in Europe, increasing the risk of data breaches and reputational damage. Supply chain attacks via backdoored Moltbot plugins could propagate malware to downstream users and customers, amplifying the impact. The exposure of OAuth tokens and API keys can also facilitate further compromise of cloud services and internal systems. Given the widespread adoption of VS Code and the growing interest in AI coding assistants in European tech sectors, the threat could disrupt development workflows and undermine trust in open-source AI tools.
Mitigation Recommendations
European organizations should immediately audit their installed VS Code extensions to identify and remove any unauthorized or suspicious plugins, especially those claiming to be AI coding assistants related to Moltbot or ClawdBot. Implement strict extension whitelisting policies and use enterprise management tools to control extension installation. Conduct thorough reviews of Moltbot instances if deployed internally, including revoking all connected service integrations, rotating exposed credentials, and enforcing network segmentation and firewall rules to restrict outbound connections from developer machines. Monitor network traffic for connections to known malicious domains (e.g., clawdbot.getintwopc[.]site, meeting.bulletmailer[.]net, darkgptprivate[.]com) and unusual ScreenConnect client activity. Employ endpoint detection and response (EDR) solutions capable of detecting DLL sideloading and unauthorized remote desktop software installations. Educate developers about the risks of installing unverified extensions and the importance of verifying extension publishers. For organizations using Moltbot, enforce secure-by-default configurations, including credential validation, sandboxing untrusted plugins, and applying least privilege principles. Regularly update and patch development environments and monitor for indicators of compromise. Collaborate with security teams to conduct threat hunting focused on this attack vector and share intelligence with industry peers to improve collective defense.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Austria, Belgium, Spain, Italy
Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
Description
Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the official Extension Marketplace that claims to be a free artificial intelligence (AI) coding assistant, but stealthily drops a malicious payload on compromised hosts. The extension, named "ClawdBot Agent - AI Coding Assistant" ("clawdbot.clawdbot-agent")
AI-Powered Analysis
Technical Analysis
The malicious VS Code extension named "ClawdBot Agent - AI Coding Assistant" masqueraded as a legitimate AI coding assistant related to the open-source Moltbot project, which itself does not have an official VS Code extension. Published on January 27, 2026, by an attacker-controlled account, the extension was designed to execute automatically upon IDE startup. It stealthily downloaded a "config.json" file from a malicious domain (clawdbot.getintwopc[.]site), which contained instructions to execute a binary named "Code.exe." This binary deployed a legitimate remote desktop software, ConnectWise ScreenConnect, configured to connect to an attacker-controlled relay server (meeting.bulletmailer[.]net:8041), granting persistent remote access to the infected machine. To ensure resilience, the extension included fallback mechanisms such as sideloading a Rust-written DLL named "DWrite.dll" from Dropbox and using batch scripts to retrieve payloads from an alternate domain (darkgptprivate[.]com). These redundancies ensured payload delivery even if primary C2 servers were taken down. The attackers leveraged the popularity of Moltbot, an AI assistant enabling local LLM interactions over multiple messaging platforms, to deceive developers into installing the malicious extension. Beyond the extension, researchers discovered that many Moltbot instances were misconfigured, exposing sensitive data like API keys, OAuth credentials, and private chat histories. Since Moltbot agents can send messages and execute commands on behalf of users across platforms like Telegram, Slack, Discord, and WhatsApp, compromised instances could be used to impersonate users, inject malicious messages, exfiltrate data, and distribute backdoored plugins via MoltHub, enabling supply chain attacks. The root cause is Moltbot's architecture prioritizing ease of deployment over security, lacking enforced firewall rules, credential validation, and sandboxing, which facilitates widespread misconfigurations and compromises across cloud providers. Microsoft has removed the malicious extension from the marketplace, but the threat underscores risks in open-source AI tooling ecosystems and supply chain security.
Potential Impact
European organizations, particularly software development firms and enterprises relying on Visual Studio Code and AI-assisted coding tools, face significant risks from this threat. The malicious extension enables attackers to gain persistent remote access to developer workstations, potentially leading to intellectual property theft, insertion of malicious code into software projects, and lateral movement within corporate networks. The stealthy nature of the payload delivery and fallback mechanisms complicate detection and remediation efforts. Furthermore, compromised Moltbot instances can lead to unauthorized access to sensitive communications and credentials across multiple messaging platforms widely used in Europe, increasing the risk of data breaches and reputational damage. Supply chain attacks via backdoored Moltbot plugins could propagate malware to downstream users and customers, amplifying the impact. The exposure of OAuth tokens and API keys can also facilitate further compromise of cloud services and internal systems. Given the widespread adoption of VS Code and the growing interest in AI coding assistants in European tech sectors, the threat could disrupt development workflows and undermine trust in open-source AI tools.
Mitigation Recommendations
European organizations should immediately audit their installed VS Code extensions to identify and remove any unauthorized or suspicious plugins, especially those claiming to be AI coding assistants related to Moltbot or ClawdBot. Implement strict extension whitelisting policies and use enterprise management tools to control extension installation. Conduct thorough reviews of Moltbot instances if deployed internally, including revoking all connected service integrations, rotating exposed credentials, and enforcing network segmentation and firewall rules to restrict outbound connections from developer machines. Monitor network traffic for connections to known malicious domains (e.g., clawdbot.getintwopc[.]site, meeting.bulletmailer[.]net, darkgptprivate[.]com) and unusual ScreenConnect client activity. Employ endpoint detection and response (EDR) solutions capable of detecting DLL sideloading and unauthorized remote desktop software installations. Educate developers about the risks of installing unverified extensions and the importance of verifying extension publishers. For organizations using Moltbot, enforce secure-by-default configurations, including credential validation, sandboxing untrusted plugins, and applying least privilege principles. Regularly update and patch development environments and monitor for indicators of compromise. Collaborate with security teams to conduct threat hunting focused on this attack vector and share intelligence with industry peers to improve collective defense.
Affected Countries
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/01/fake-moltbot-ai-coding-assistant-on-vs.html","fetched":true,"fetchedAt":"2026-01-28T20:27:03.206Z","wordCount":1233}
Threat ID: 697a711c4623b1157ced2a00
Added to database: 1/28/2026, 8:27:08 PM
Last enriched: 1/28/2026, 8:27:31 PM
Last updated: 1/30/2026, 12:00:55 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Dissecting UAT-8099: New persistence mechanisms and regional focus
MediumExposed BYOB C2 Infrastructure Reveals a Multi-Stage Malware Deployment
MediumThreatFox IOCs for 2026-01-28
MediumCan't stop, won't stop: TA584 innovates initial access
MediumFake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.