Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Malicious VSX Extension SleepyDuck: New Cybersecurity Threat Uncovered

Автор: Infosec Now

Загружено: 2025-12-30

Просмотров: 3

Описание:

What youll learn: In this video, we delve into the emergence of a new cybersecurity threat known as SleepyDuck, a malicious extension found in the Open VSX registry that utilizes a remote access trojan to compromise developers. Well explore the timeline of its discovery, the impact on developers and organizations, and what steps can be taken to mitigate risks associated with such threats.

On November 3, 2025, cybersecurity researchers flagged a new malicious extension in the Open VSX registry harboring a remote access trojan called SleepyDuck. This extension, identified as juan-bianco.solidity-vlang (version 0.0.7), was initially published on October 31, 2025, as a benign library. However, it was quickly updated to version 0.0.8 on November 1, 2025, to include malicious capabilities after amassing 14,000 downloads. The rapid transition from a harmless tool to a dangerous malware source raises significant concerns for developers using the Open VSX platform.

According to John Tuckner from Secure Annex, the malware incorporates sandbox evasion techniques and leverages an Ethereum contract to maintain its command and control server. This means that even if the original server address is taken down, the malware can update its location, posing a continuous threat to its victims. The malware activates when a new code editor window is opened or a .sol file is selected, establishing a connection to a remote server at sleepyduck[.]xyz and executing commands every 30 seconds.

The implications of this discovery are severe, particularly for developers in the Solidity programming community. The malware is designed to gather sensitive system information such as hostname, username, MAC address, and timezone, which it exfiltrates to the command server. Furthermore, there are concerns that the download counts for the extension may have been artificially inflated, a tactic often used to mislead developers into installing malicious software.

This incident is part of a broader trend of rogue extensions targeting developers, highlighted by a previous case in July 2025 where a Russian developer lost $500,000 in cryptocurrency due to a similar malicious extension. As the threat landscape evolves, organizations must remain vigilant against such risks.

In response to this incident, users are advised to exercise caution when downloading extensions and ensure they are from trusted publishers. Microsoft has announced plans to implement periodic marketplace-wide scans to protect users from malware. Developers should also regularly check the RemovedPackages page on GitHub to stay informed about any extensions that have been removed due to security concerns.

As we move forward, it will be crucial to monitor the developments surrounding SleepyDuck and similar threats. Organizations should enhance their security measures, including regular audits of installed extensions and increased awareness training for developers to recognize potential threats. By staying informed and proactive, developers can better protect themselves against the evolving landscape of cybersecurity threats.

In summary, the emergence of the SleepyDuck extension serves as a stark reminder of the vulnerabilities present in software development environments. By understanding the risks and taking appropriate actions, developers can safeguard their projects and maintain the integrity of their development processes.

Malicious VSX Extension SleepyDuck: New Cybersecurity Threat Uncovered

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Cybersecurity Update: Major Vulnerabilities and Threats Uncovered

Cybersecurity Update: Major Vulnerabilities and Threats Uncovered

10 npm Packages Caught Stealing Developer Credentials

10 npm Packages Caught Stealing Developer Credentials

Война завершается / НАТО вступает в бой / Атака на остров

Война завершается / НАТО вступает в бой / Атака на остров

Why did they make this?

Why did they make this?

Появляется новый тип искусственного интеллекта, и он лучше, чем LLMS?

Появляется новый тип искусственного интеллекта, и он лучше, чем LLMS?

The AI Bubble Is This the Dot-Com Crash 2.0

The AI Bubble Is This the Dot-Com Crash 2.0

Sting - Shape of My Heart || Sylwester z Dwójką 2025

Sting - Shape of My Heart || Sylwester z Dwójką 2025

the BEST Home Server Backup App I've Used - ZeroByte

the BEST Home Server Backup App I've Used - ZeroByte

ГОТОВЫ СОЗДАТЬ ЦИФРОВОЕ БУДУЩЕЕ? Вот как это сделать. Добро пожаловать в 2026 год, где правит 6G.

ГОТОВЫ СОЗДАТЬ ЦИФРОВОЕ БУДУЩЕЕ? Вот как это сделать. Добро пожаловать в 2026 год, где правит 6G.

the creator of Claude Code just revealed the truth

the creator of Claude Code just revealed the truth

The End of Google’s Search Monopoly: What Every Business Owner Needs to Know Right Now

The End of Google’s Search Monopoly: What Every Business Owner Needs to Know Right Now

Sting - Every Breath You Take || Sylwester z Dwójką 2025

Sting - Every Breath You Take || Sylwester z Dwójką 2025

Почему поддержка ИИ важнее, чем конкретные сценарии использования (Эрика Флауэрс) | Подкаст Invis...

Почему поддержка ИИ важнее, чем конкретные сценарии использования (Эрика Флауэрс) | Подкаст Invis...

Prezydent Nawrocki: wybierając mnie, Polacy wyraźnie pokazali, że nie podoba im się ten rząd!

Prezydent Nawrocki: wybierając mnie, Polacy wyraźnie pokazali, że nie podoba im się ten rząd!

Лучший бесплатный инструмент для работы с продавцами Amazon стал еще лучше.

Лучший бесплатный инструмент для работы с продавцами Amazon стал еще лучше.

Massive ClickFix Phishing Attacks Target Hotels with PureRAT Malware

Massive ClickFix Phishing Attacks Target Hotels with PureRAT Malware

ESKA Hity na Czasie - Oficjalny Mix Gorąca 100 Radia ESKA 2025

ESKA Hity na Czasie - Oficjalny Mix Gorąca 100 Radia ESKA 2025

Qilin Ransomware: A New Hybrid Threat in Cybersecurity

Qilin Ransomware: A New Hybrid Threat in Cybersecurity

Выравнивание ИИ — проблема Лавкрафта | Цель, пожирающая реальность

Выравнивание ИИ — проблема Лавкрафта | Цель, пожирающая реальность

U.S. Sanctions Target North Korean Cybercrime and Money Laundering

U.S. Sanctions Target North Korean Cybercrime and Money Laundering

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]