Saturday, May 3, 2025
HomeCyber Security NewsVisual Studio Tunnels Abused For Stealthy Remote Access

Visual Studio Tunnels Abused For Stealthy Remote Access

Published on

SIEM as a Service

Follow Us on Google News

In an attack campaign dubbed “Operation Digital Eye,” a suspected China-nexus threat actor has been observed targeting business-to-business IT service providers in Southern Europe. 

The attack operation lasted roughly three weeks, from late June to mid-July 2024. The intrusions could have allowed the attackers to gain a strategic foothold and compromise downstream entities. 

In particular, threat actors exploited Visual Studio Code and Microsoft Azure infrastructure for C2 purposes, attempting to avoid detection by disguising illicit activity as legitimate.

- Advertisement - Google News

“Our visibility suggests that the abuse of Visual Studio Code for C2 purposes had been relatively rare in the wild before this campaign.

Operation Digital Eye marks the first instance of a suspected Chinese APT group using this technique that we have directly observed”, Tinexta Cyber and SentinelLabs researchers.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Chinese APT via Visual Studio Code Tunnels

The Microsoft Visual Studio Code Remote Tunnels technology, which initially emerged to facilitate remote work, offers complete endpoint access, including the ability to execute commands and manipulate files. 

Furthermore, Visual Studio Code tunneling uses Microsoft-signed executables and Microsoft Azure network infrastructure, both of which are frequently not closely watched and are normally permitted by firewall rules and application restrictions.

Because of this, this method might be difficult to identify and could bypass security measures. This makes Visual Studio Code tunneling a compelling and potent tool for threat actors to take advantage of, especially when combined with the complete endpoint access it offers.

To get access to database servers and web servers that are visible to the Internet, the attackers first used SQL (Structured Query Language) injection.

The web traffic logs discovered showed User-Agent request headers, which indicates the attackers automated the identification and exploitation of SQL injection vulnerabilities using the sqlmap tool.

The threat actors used a PHP-based web shell named PHPsert to gain initial access and sustain ongoing access. 

“To disguise the files implementing PHPsert and attempt to evade detection based on filesystem activity, the attackers used custom names tailored to the infiltrated environments, making the file names appear legitimate”, researchers said.

“This included using the local language and terms that aligned with the technological context of the targeted organizations”.

The threat actors used a range of third-party applications and built-in Windows programs to perform reconnaissance after gaining an initial footing.

to the Local Security Authority Subsystem Service (LSASS) process using the CreateDump tool.

The threat actors frequently named the files they deployed using the pattern do.* The attackers used pass-the-hash methods and RDP (Remote Desktop Protocol) connections to migrate laterally across the internal network from the initial compromised endpoints. 

Further, they employed a specially modified version of Mimikatz, which was implemented in an executable called bK2o.exe, for the pass-the-hash attacks.

Visual Studio Code Remote Tunnels, built on Microsoft’s dev tunnel technology, allow developers to access and work on remote systems.

Activities such as execution of commands and modifying files are made possible by this access, which also includes the file system and command terminal.

The threat actors installed a portable Visual Studio Code executable called code.exe, which is digitally signed by Microsoft, and used the winsw tool to execute it as a Windows service. 

A Collection of China-Nexus APT Tools dubbed mimCN
A Collection of China-Nexus APT Tools dubbed mimCN (Source: SentinelLabs)

Further, wsx.exe, wsx1.exe, mim221 components that were used in Operation Tainted Love, and simplify_32.exe were used in Operation Soft Cell.

Use of mimCN samples
Use of mimCN samples (Source: SentinelLabs)

“We assess that Operation Digital Eye was highly likely conducted by a China-nexus cluster with cyberespionage motivations. The specific group responsible remains unclear due to the extensive sharing of malware, operational playbooks, and infrastructure management processes among Chinese APT clusters”, researchers said.

According to the research, the operators were most active in the networks of the targeted organizations between 9 a.m. and 9 p.m. CST, which is the average working hour in China.

According to an earlier study, a suspected North Korean gang has been using Visual Studio Remote Tunnels to stay persistent in a hacked network since 2023.

Further, threat actors disseminated a Windows Shortcut (LNK) file to launch Visual Studio Code and turn on its tunneling functionality to provide remote access, according to a report published by Cyble in October 2024 that detailed unattributed activities.

Unit 42 released a report in September 2024 on a campaign that used Visual Studio Code as a backdoor to target Southeast Asian government entities. The campaign was credited to Stately Taurus (also known as Mustang Panda). 

Chinese APT groups frequently adopt pragmatic, solution-focused strategies to avoid detection, as demonstrated by this campaign’s abuse of Visual Studio Code Remote Tunnels.

This necessitates that defenders reevaluate conventional security methods and establish strong detection systems in place to spot such evasive tactics instantly.

Investigate Real-World Malicious Links,Malware & Phishing Attacks With ANY.RUN - Try for Free

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives

North Korean nationals have successfully infiltrated the employee ranks of major global corporations at...

Stealthy New NodeJS Backdoor Infects Users Through CAPTCHA Verifications

Security researchers have uncovered a sophisticated malware campaign utilizing fake CAPTCHA verification screens to...

State-Sponsored Hacktivism on the Rise, Transforming the Cyber Threat Landscape

Global cybersecurity landscape is undergoing a significant transformation, as state-sponsored hacktivism gains traction amid...

NVIDIA Riva AI Speech Flaw Let Hackers Gain Unauthorized Access to Abuse GPU Resources & API keys

Researchers have uncovered significant security vulnerabilities in NVIDIA Riva, a breakthrough AI speech technology...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives

North Korean nationals have successfully infiltrated the employee ranks of major global corporations at...

State-Sponsored Hacktivism on the Rise, Transforming the Cyber Threat Landscape

Global cybersecurity landscape is undergoing a significant transformation, as state-sponsored hacktivism gains traction amid...

Stealthy New NodeJS Backdoor Infects Users Through CAPTCHA Verifications

Security researchers have uncovered a sophisticated malware campaign utilizing fake CAPTCHA verification screens to...