Recent reports suggest that threat actors have been spreading malicious versions of Microsoft Visual Studio, a highly familiar Integrated Development Environment (IDE) used by several developers worldwide.
Recently, cybercriminals have been targeting the familiar IDE, Microsoft Visual Studio, with malicious software. This threat, spread by malicious actors, has been detected and is a cause for concern.
This malicious software delivers a cookie stealer capable of stealing sensitive information like browser cookies containing usernames and passwords.
Developers were targeted as they have access to a lot of sensitive information as part of their job, which can be useful for threat actors to access confidential data and spread malware across servers and networks.
This malware consists of a filename “VisualStudio[.]exe” and a Visual Studio Folder that contains the Mainproject[.]exe file a.k.a. Information stealing malware. It is a 32-bit GUI-based .NET executable file.
Visual Studio.exe – 7e8f18c60e35472bf921d3b67fd427933bd150f57d6e83d1472b990a786976db
MainProject.exe – e8a449e692f1b21f1bc4d49d8b27068b03dd7e8df583d429266fdfb261ddeed5
The installation of the VisualStudio[.]exe also simultaneously prompts the installation of Mainproject[.]exe.
If the user permits the Mainproject[.]exe’s installation, the information stealer malware begins to extract information like Machine name, username, processor bit version, operating system version, platform, and IP address.
Once after extraction of system data is done, it proceeds to exfiltrate cookies from browsers like Google Chrome, Firefox, Opera, and Edge.
Furthermore, the cookie stealer targets acquiring the cookies of famous social media platforms and also generates a separate .txt file for these social media credentials.
All this information extracted is stored in the temp folder on the directory where the installation was executed. These data are then transmitted as a .zip file through Telegram designated bot as part of exfiltration.
Once these processes are done, the malware executes the legitimate vs-professional.exe file and deletes the temp folder to hide its track.
Researchers at Cyble have published a complete report about this malware regarding its operation, source code, and other information.
Users of Microsoft Visual Studio (specifically developers) are recommended to take extra precautions when downloading Microsoft Visual Studio from external sites and be vigilant towards this information-stealing malware.
Stay up-to-date with the latest Cyber Security News; follow us on GoogleNews, Linkedin, Twitter, and Facebook.
Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol (RDP).…
Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that is…
Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek, a…
The highly anticipated release of OPNsense 25.1 has officially arrived! Nicknamed "Ultimate Unicorn," this update…
Microsoft has officially added DeepSeek R1, an advanced AI model, to its Azure AI Foundry…
Researchers from the Georgia Institute of Technology and Ruhr University Bochum have uncovered two novel…