How Malware Uses VS Code Extensions for A/B Testing and Data Theft (2026)

Malware's New Trick: A/B Testing on Developers' Trust

A cunning malware campaign has been uncovered, targeting software developers with a unique approach. A threat actor, tracked by Koi (https://www.koi.ai/), conducted A/B testing using two malicious VS Code extensions, 'Bitcoin Black' and 'Codo AI'. This innovative tactic aimed to exploit the blind trust developers often place in their tools.

But here's where it gets controversial: The extensions were tailored to specific developer profiles. Bitcoin Black, with its dark theme, lured crypto enthusiasts, while Codo AI, an AI-powered coding assistant, attracted productivity-focused engineers. Both extensions turned the developers' workstations into surveillance tools, but with a twist.

The attackers combined social engineering with a clever technique called DLL hijacking. They used a signed, legitimate binary to load their malicious payload, bypassing standard security controls. This is a stark reminder that the software supply chain is under constant scrutiny for vulnerabilities, especially in the tools developers rely on daily.

A closer look at the extensions reveals intriguing details: Bitcoin Black broke the rules by using an aggressive activation event, forcing code execution with every VS Code action. Codo AI, on the other hand, hid its malicious trigger deep in the source code, making it harder to detect. And this is the part most people miss—Codo AI actually worked as advertised, allowing users to chat with AI models while the malware operated in the background.

The malware's evolution is a fascinating journey. Early versions were clunky, using a PowerShell script with multiple fallback methods to extract a protected ZIP file. But the attackers learned from their mistakes. Later versions streamlined the process with a batch script, directly pulling the executable and DLL, and even adding a marker file to prevent re-infection.

The payload's delivery mechanism is a masterpiece of deception. It downloads a legitimate executable, Lightshot, and places a malicious DLL alongside it. When Lightshot runs, it loads the attacker's DLL, inheriting its trust. This allows the malware to fly under the radar, tricking security tools and users alike.

The malware's capabilities are alarming. It steals clipboard history, WiFi passwords, and system information. But its most invasive feature is browser session hijacking. It launches browsers in headless mode, stealing cookies and bypassing logins, all while the developer remains unaware.

Intriguingly, the attackers left human fingerprints in their code. Comments like "KEEP POWERSHELL/BAT METHOD" hint at a team dynamic. The mutex name, COOLSCREENSHOTMUTEX_YARRR, adds a touch of humor but also serves as a unique indicator of compromise. These personal touches provide valuable insights into the attackers' mindset.

This campaign exposes a critical blind spot in securing development environments. Developers, who meticulously vet production dependencies, often overlook the risks in their IDE extensions. The attackers exploited this trust, showing that a helpful tool can become a powerful weapon.

Security teams should be vigilant about signed binaries launching from unexpected locations. The malware's DLL hijacking technique underscores the importance of monitoring module loads, not just process names. As the analysis concludes, the campaign is a mix of sophistication and simplicity, but the effective techniques are what make it dangerous.

The cybersecurity landscape is ever-evolving, and staying informed is crucial. For those eager to delve deeper, the Cyber Security & Cloud Expo (https://cybersecuritycloudexpo.com/?utmsource=CloudTech-News&utmmedium=Footer-banner&utmcampaign=world-series) offers a wealth of insights. The event, part of TechEx (https://techexevent.com/?utmsource=CloudTech-News&utmmedium=Footer-banner&utmcampaign=world-series), brings together industry leaders in Amsterdam, California, and London. Explore the link for more details.

Stay tuned for more tech-focused content, powered by TechForge Media (https://techforge.pub/?utmsource=cloud-News&utmmedium=Footer-banner&utmcampaign=world-series). Don't miss out on upcoming events and webinars (https://techforge.pub/events/?utmsource=cloud-News&utmmedium=Footer-banner&utmcampaign=world-series) that will keep you at the forefront of enterprise technology.

How Malware Uses VS Code Extensions for A/B Testing and Data Theft (2026)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Duane Harber

Last Updated:

Views: 5894

Rating: 4 / 5 (51 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Duane Harber

Birthday: 1999-10-17

Address: Apt. 404 9899 Magnolia Roads, Port Royceville, ID 78186

Phone: +186911129794335

Job: Human Hospitality Planner

Hobby: Listening to music, Orienteering, Knapping, Dance, Mountain biking, Fishing, Pottery

Introduction: My name is Duane Harber, I am a modern, clever, handsome, fair, agreeable, inexpensive, beautiful person who loves writing and wants to share my knowledge and understanding with you.