Friday, February 28, 2025
Homecyber securityHacker-Attacking Developers Using Weaponized MS Visual Studio

Hacker-Attacking Developers Using Weaponized MS Visual Studio

Published on

SIEM as a Service

Follow Us on Google News

Recent reports suggest that threat actors have been spreading malicious versions of Microsoft Visual Studio, a highly familiar Integrated Development Environment (IDE) used by several developers worldwide.

Recently, cybercriminals have been targeting the familiar IDE, Microsoft Visual Studio, with malicious software. This threat, spread by malicious actors, has been detected and is a cause for concern.

This malicious software delivers a cookie stealer capable of stealing sensitive information like browser cookies containing usernames and passwords.

Developers were targeted as they have access to a lot of sensitive information as part of their job, which can be useful for threat actors to access confidential data and spread malware across servers and networks.

Weaponized MS Visual Studio

This malware consists of a filename “VisualStudio[.]exe” and a Visual Studio Folder that contains the Mainproject[.]exe file a.k.a. Information stealing malware. It is a 32-bit GUI-based .NET executable file.

SHA256 hashes:

Visual Studio.exe – 7e8f18c60e35472bf921d3b67fd427933bd150f57d6e83d1472b990a786976db

MainProject.exe – e8a449e692f1b21f1bc4d49d8b27068b03dd7e8df583d429266fdfb261ddeed5

Visual Studio Installer Bundle with Information Stealer Malware

The installation of the VisualStudio[.]exe also simultaneously prompts the installation of Mainproject[.]exe.

If the user permits the Mainproject[.]exe’s installation, the information stealer malware begins to extract information like Machine name, username, processor bit version, operating system version, platform, and IP address.

Once after extraction of system data is done, it proceeds to exfiltrate cookies from browsers like Google Chrome, Firefox, Opera, and Edge.

Furthermore, the cookie stealer targets acquiring the cookies of famous social media platforms and also generates a separate .txt file for these social media credentials.

All this information extracted is stored in the temp folder on the directory where the installation was executed. These data are then transmitted as a .zip file through Telegram designated bot as part of exfiltration.

Exfiltration through Telegram (Source: Cyble)

Once these processes are done, the malware executes the legitimate vs-professional.exe file and deletes the temp folder to hide its track.

Researchers at Cyble have published a complete report about this malware regarding its operation, source code, and other information.

Users of Microsoft Visual Studio (specifically developers) are recommended to take extra precautions when downloading Microsoft Visual Studio from external sites and be vigilant towards this information-stealing malware.

Stay up-to-date with the latest Cyber Security News; follow us on GoogleNewsLinkedinTwitterand Facebook.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...