By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto
Computing

Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto

News Room
Last updated: 2026/01/20 at 8:40 AM
News Room Published 20 January 2026
Share
Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto
SHARE

Ravie LakshmananJan 20, 2026Cloud Security / Developer Security

Cybersecurity researchers have disclosed details of a malware campaign that’s targeting software developers with a new information stealer called Evelyn Stealer by weaponizing the Microsoft Visual Studio Code (VS Code) extension ecosystem.

“The malware is designed to exfiltrate sensitive information, including developer credentials and cryptocurrency-related data. Compromised developer environments can also be abused as access points into broader organizational systems,” Trend Micro said in an analysis published Monday.

The activity is designed to single out organizations with software development teams that rely on VS Code and third-party extensions, along with those with access to production systems, cloud resources, or digital assets, it added.

It’s worth noting that details of the campaign were first documented by Koi Security last month, when details emerged of three VS Code extensions – BigBlack.bitcoin-black, BigBlack.codo-ai, and BigBlack.mrbigblacktheme – that ultimately dropped a malicious downloader DLL (“Lightshot.dll”) responsible for launching a hidden PowerShell command to fetch and execute a second-stage payload (“runtime.exe”).

Cybersecurity

The executable, for its part, decrypts and injects the main stealer payload into a legitimate Windows process (“grpconv.exe”) directly in memory, allowing it to harvest sensitive data and exfiltrate it to a remote server (“server09.mentality[.]cloud”) over FTP in the form of a ZIP file. Some of the information collected by the malware includes –

  • Clipboard content
  • Installed apps
  • Cryptocurrency wallets
  • Running processes
  • Desktop screenshots
  • Stored Wi-Fi credentials
  • System information
  • Credentials and stored cookies from Google Chrome and Microsoft Edge

In addition, it implements safeguards to detect analysis and virtual environments and takes steps to terminate active browser processes to ensure a seamless data collection process and prevent any potential interference when attempting to extract cookies and credentials.

This is achieved by launching the browser via the command line by setting the following flags for detection and forensic traces –

  • –headless=new, to run in headless mode
  • –disable-gpu, to prevent GPU acceleration
  • –no-sandbox, to disable browser security sandbox
  • –disable-extensions, to prevent legitimate security extensions from interfering
  • –disable-logging, to disable browser log generation
  • –silent-launch, to suppress startup notifications
  • –no-first-run, to bypass initial setup dialogs
  • –disable-popup-blocking, to ensure malicious content can execute
  • –window-position=-10000,-10000, to position the window off-screen
  • –window-size=1,1, to minimize window to 1×1 pixel
Cybersecurity

“The [DLL] downloader creates a mutual exclusion (mutex) object to ensure that only one instance of the malware can run at any given time, ensuring that multiple instances of the malware cannot be executed on a compromised host,” Trend Micro said. “The Evelyn Stealer campaign reflects the operationalization of attacks against developer communities, which are seen as high-value targets given their important role in the software development ecosystem.”

The disclosure coincides with the emergence of two new Python-based stealer malware families referred to as MonetaStealer and SolyxImmortal, with the former also capable of targeting Apple macOS systems to enable comprehensive data theft.

“[SolyxImmortal] leverages legitimate system APIs and widely available third-party libraries to extract sensitive user data and exfiltrate it to attacker-controlled Discord webhooks,” CYFIRMA said.

“Its design emphasizes stealth, reliability, and long-term access rather than rapid execution or destructive behaviour. By operating entirely in user space and relying on trusted platforms for command-and-control, the malware reduces its likelihood of immediate detection while maintaining persistent visibility into user activity.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Spotify Quietly Tests a Feature to Sync Your Audiobook With a Paperback Spotify Quietly Tests a Feature to Sync Your Audiobook With a Paperback
Next Article Apple's earnings won't be dented by RAM price rises yet, says Evercore Apple's earnings won't be dented by RAM price rises yet, says Evercore
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Study: 56% of CEOs Haven’t Seen Any AI Revenue or Cost Benefits
Study: 56% of CEOs Haven’t Seen Any AI Revenue or Cost Benefits
News
Broadcom Mum On Reported VMware Security Software Ban In China
Broadcom Mum On Reported VMware Security Software Ban In China
Software
The Infrastructure Bet Behind Crypto’s Invisible Adoption | HackerNoon
The Infrastructure Bet Behind Crypto’s Invisible Adoption | HackerNoon
Computing
Google’s Phone app keeps turning sideways, and users are confused again
Google’s Phone app keeps turning sideways, and users are confused again
News

You Might also Like

The Infrastructure Bet Behind Crypto’s Invisible Adoption | HackerNoon
Computing

The Infrastructure Bet Behind Crypto’s Invisible Adoption | HackerNoon

6 Min Read
The Tech Community’s Efforts to Dethrone OpenAI | HackerNoon
Computing

The Tech Community’s Efforts to Dethrone OpenAI | HackerNoon

4 Min Read
Stop Trying to Transform Overnight. It’s Ruining Your Brain. | HackerNoon
Computing

Stop Trying to Transform Overnight. It’s Ruining Your Brain. | HackerNoon

54 Min Read
Support For More Bluetooth Guitars & Other HID Changes Ahead Of Linux 6.20~7.0
Computing

Support For More Bluetooth Guitars & Other HID Changes Ahead Of Linux 6.20~7.0

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?