Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware

0
Medium
Malware
Published: Wed Jan 28 2026 (01/28/2026, 17:46:00 UTC)
Source: The Hacker News

Description

Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the official Extension Marketplace that claims to be a free artificial intelligence (AI) coding assistant, but stealthily drops a malicious payload on compromised hosts. The extension, named "ClawdBot Agent - AI Coding Assistant" ("clawdbot.clawdbot-agent")

AI-Powered Analysis

AILast updated: 01/28/2026, 20:27:31 UTC

Technical Analysis

The malicious VS Code extension named "ClawdBot Agent - AI Coding Assistant" masqueraded as a legitimate AI coding assistant related to the open-source Moltbot project, which itself does not have an official VS Code extension. Published on January 27, 2026, by an attacker-controlled account, the extension was designed to execute automatically upon IDE startup. It stealthily downloaded a "config.json" file from a malicious domain (clawdbot.getintwopc[.]site), which contained instructions to execute a binary named "Code.exe." This binary deployed a legitimate remote desktop software, ConnectWise ScreenConnect, configured to connect to an attacker-controlled relay server (meeting.bulletmailer[.]net:8041), granting persistent remote access to the infected machine. To ensure resilience, the extension included fallback mechanisms such as sideloading a Rust-written DLL named "DWrite.dll" from Dropbox and using batch scripts to retrieve payloads from an alternate domain (darkgptprivate[.]com). These redundancies ensured payload delivery even if primary C2 servers were taken down. The attackers leveraged the popularity of Moltbot, an AI assistant enabling local LLM interactions over multiple messaging platforms, to deceive developers into installing the malicious extension. Beyond the extension, researchers discovered that many Moltbot instances were misconfigured, exposing sensitive data like API keys, OAuth credentials, and private chat histories. Since Moltbot agents can send messages and execute commands on behalf of users across platforms like Telegram, Slack, Discord, and WhatsApp, compromised instances could be used to impersonate users, inject malicious messages, exfiltrate data, and distribute backdoored plugins via MoltHub, enabling supply chain attacks. The root cause is Moltbot's architecture prioritizing ease of deployment over security, lacking enforced firewall rules, credential validation, and sandboxing, which facilitates widespread misconfigurations and compromises across cloud providers. Microsoft has removed the malicious extension from the marketplace, but the threat underscores risks in open-source AI tooling ecosystems and supply chain security.

Potential Impact

European organizations, particularly software development firms and enterprises relying on Visual Studio Code and AI-assisted coding tools, face significant risks from this threat. The malicious extension enables attackers to gain persistent remote access to developer workstations, potentially leading to intellectual property theft, insertion of malicious code into software projects, and lateral movement within corporate networks. The stealthy nature of the payload delivery and fallback mechanisms complicate detection and remediation efforts. Furthermore, compromised Moltbot instances can lead to unauthorized access to sensitive communications and credentials across multiple messaging platforms widely used in Europe, increasing the risk of data breaches and reputational damage. Supply chain attacks via backdoored Moltbot plugins could propagate malware to downstream users and customers, amplifying the impact. The exposure of OAuth tokens and API keys can also facilitate further compromise of cloud services and internal systems. Given the widespread adoption of VS Code and the growing interest in AI coding assistants in European tech sectors, the threat could disrupt development workflows and undermine trust in open-source AI tools.

Mitigation Recommendations

European organizations should immediately audit their installed VS Code extensions to identify and remove any unauthorized or suspicious plugins, especially those claiming to be AI coding assistants related to Moltbot or ClawdBot. Implement strict extension whitelisting policies and use enterprise management tools to control extension installation. Conduct thorough reviews of Moltbot instances if deployed internally, including revoking all connected service integrations, rotating exposed credentials, and enforcing network segmentation and firewall rules to restrict outbound connections from developer machines. Monitor network traffic for connections to known malicious domains (e.g., clawdbot.getintwopc[.]site, meeting.bulletmailer[.]net, darkgptprivate[.]com) and unusual ScreenConnect client activity. Employ endpoint detection and response (EDR) solutions capable of detecting DLL sideloading and unauthorized remote desktop software installations. Educate developers about the risks of installing unverified extensions and the importance of verifying extension publishers. For organizations using Moltbot, enforce secure-by-default configurations, including credential validation, sandboxing untrusted plugins, and applying least privilege principles. Regularly update and patch development environments and monitor for indicators of compromise. Collaborate with security teams to conduct threat hunting focused on this attack vector and share intelligence with industry peers to improve collective defense.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/01/fake-moltbot-ai-coding-assistant-on-vs.html","fetched":true,"fetchedAt":"2026-01-28T20:27:03.206Z","wordCount":1233}

Threat ID: 697a711c4623b1157ced2a00

Added to database: 1/28/2026, 8:27:08 PM

Last enriched: 1/28/2026, 8:27:31 PM

Last updated: 1/30/2026, 12:00:55 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats