Recent reports suggest that threat actors have been spreading malicious versions of Microsoft Visual Studio, a highly familiar Integrated Development Environment (IDE) used by several developers worldwide.
Recently, cybercriminals have been targeting the familiar IDE, Microsoft Visual Studio, with malicious software. This threat, spread by malicious actors, has been detected and is a cause for concern.
This malicious software delivers a cookie stealer capable of stealing sensitive information like browser cookies containing usernames and passwords.
Developers were targeted as they have access to a lot of sensitive information as part of their job, which can be useful for threat actors to access confidential data and spread malware across servers and networks.
This malware consists of a filename “VisualStudio[.]exe” and a Visual Studio Folder that contains the Mainproject[.]exe file a.k.a. Information stealing malware. It is a 32-bit GUI-based .NET executable file.
Visual Studio.exe – 7e8f18c60e35472bf921d3b67fd427933bd150f57d6e83d1472b990a786976db
MainProject.exe – e8a449e692f1b21f1bc4d49d8b27068b03dd7e8df583d429266fdfb261ddeed5
The installation of the VisualStudio[.]exe also simultaneously prompts the installation of Mainproject[.]exe.
If the user permits the Mainproject[.]exe’s installation, the information stealer malware begins to extract information like Machine name, username, processor bit version, operating system version, platform, and IP address.
Once after extraction of system data is done, it proceeds to exfiltrate cookies from browsers like Google Chrome, Firefox, Opera, and Edge.
Furthermore, the cookie stealer targets acquiring the cookies of famous social media platforms and also generates a separate .txt file for these social media credentials.
All this information extracted is stored in the temp folder on the directory where the installation was executed. These data are then transmitted as a .zip file through Telegram designated bot as part of exfiltration.
Once these processes are done, the malware executes the legitimate vs-professional.exe file and deletes the temp folder to hide its track.
Researchers at Cyble have published a complete report about this malware regarding its operation, source code, and other information.
Users of Microsoft Visual Studio (specifically developers) are recommended to take extra precautions when downloading Microsoft Visual Studio from external sites and be vigilant towards this information-stealing malware.
Stay up-to-date with the latest Cyber Security News; follow us on GoogleNews, Linkedin, Twitter, and Facebook.
A recent report by Cyble has shed light on the evolving tactics of hacktivist groups,…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released nine new advisories detailing severe…
Email security solutions are critical for protecting organizations from the growing sophistication of cyber threats…
A new form of phishing attack is making waves among job seekers, as cybercriminals exploit…
Security Operations Centers (SOCs) are facing a mounting crisis: alert fatigue. As cyber threats multiply…
The Sysdig Threat Research Team (TRT) has revealed a significant evolution in the offensive capabilities…