When AI Excitement Becomes a Security Nightmare
The internet went absolutely wild this past weekend. Everyone was talking about Claudebot—the new personal AI assistant that supposedly “just does things” and gets stuff done. But while the tech community was buzzing with excitement, something sinister was brewing in the shadows. Cybercriminals didn’t miss a beat. They spotted an opportunity in the hype and created a fake Claudebot VS Code extension that’s actually a trojan horse for remote access malware. This isn’t just another security scare—it’s a masterclass in how attackers exploit our enthusiasm for new technology.
The Rise of Claudebot: What Everyone’s Talking About
Understanding the Legitimate AI Assistant
Claudebot (recently renamed to Moltbot after Anthropic’s request) burst onto the scene as a revolutionary personal AI assistant. The concept is simple yet powerful: an AI that doesn’t just answer questions but actually executes tasks on your behalf. Imagine an assistant that can access your emails, manage your calendar, and handle your digital workflows—all autonomously.
The appeal is undeniable. Developers, professionals, and tech enthusiasts immediately recognized the potential. Live streams about Claudebot’s capabilities flooded YouTube, Twitch, LinkedIn, and Twitter. The energy was electric. But as with any viral technology, where there’s hype, there are predators waiting to exploit it.
Why Cybercriminals Love Trending Technology
Here’s the uncomfortable truth: hackers don’t innovate in a vacuum. They ride the wave of whatever’s trending. When something goes viral, millions of people are suddenly interested, distracted, and—most importantly—less cautious. They’re so excited about the new technology that they skip security steps. They download from untrusted sources. They ignore warning signs.
This is exactly what happened with the fake Claudebot extension.
The Malicious Extension: How the Scam Works
The Fake VS Code Extension Exposed
The Aikido security team, led by researcher Charlie Ericson, uncovered something alarming: a malicious Visual Studio Code extension masquerading as the official Claudebot agent. Here’s what makes this particularly dangerous: the real Claudebot team has never published an official VS Code extension.
Let that sink in. The extension doesn’t exist legitimately, but it existed on the VS Code marketplace anyway.
The extension was presented with professional polish. It had an icon, an emoji-filled description, and what looked like legitimate documentation. To an unsuspecting developer working late at night, it appeared completely authentic. The GitHub repository it referenced? Fake. The overview details? Vague and sketchy. But the marketing was just convincing enough to trick people into installing it.
What the Extension Actually Does
When you install this malware, it doesn’t immediately announce itself. Instead, it operates through a series of carefully orchestrated steps:
- Initial Activation: Upon VS Code startup, the extension triggers automatically through activation events
- Configuration Retrieval: It attempts to fetch a configuration file from a suspicious URL (claudebot.get-into-pc.site)
- Payload Download: Based on the configuration, it downloads and executes additional malicious files
- Remote Access Installation: The final payload is Screen Connect—a legitimate remote access tool weaponized to give attackers complete control of your machine
The Technical Breakdown
The extension’s code reveals its true nature. Inside the extension.js file, developers can see references to:
- A config URL pointing to
claudebot.get-into-pc.site - Functions designed to download and execute files
- Fallback mechanisms if the primary attack fails
- References to Screen Connect installation files
The code is wrapped in try-catch blocks—a technique used to silently fail if something goes wrong, ensuring the malware doesn’t crash and alert the user to its presence.
Screen Connect: The Weapon of Choice
What Is Screen Connect?
Screen Connect (originally called ConnectWise Control) is legitimate remote access software designed for IT support professionals. It allows technicians to remotely troubleshoot computers, fix problems, and provide customer support. It’s trusted. It’s official. It’s widely used across the industry.
And it’s the most abused remote access tool by cybercriminals.
Why Attackers Love Screen Connect
Think about it from a hacker’s perspective. If you install custom malware, antivirus software might flag it immediately. But Screen Connect? It’s signed by a trusted company. It’s recognized by security systems as legitimate software. Installing it is like hiding a bomb inside a birthday cake—the cake itself is perfectly innocent.
The weaponized version of Screen Connect works exactly like the legitimate version, except it connects to the attacker’s server instead of a legitimate support technician’s. Once connected, the attacker has complete remote access to your machine. They can:
- Steal files and credentials
- Install additional malware
- Monitor your activities
- Access sensitive information
- Pivot to other systems on your network
The Remote Access Trojan (RAT) Connection
A Remote Access Trojan is malware that gives attackers unauthorized remote access to your computer. Screen Connect, when weaponized, becomes exactly that. The distinction between legitimate software and malware often comes down to intent—and in this case, the intent is purely malicious.
The Evelyn Info Stealer Connection
Uncovering a Larger Campaign
As researchers dug deeper, they discovered something even more troubling: this wasn’t an isolated incident. The fake Claudebot extension was connected to a larger, more sophisticated campaign involving the Evelyn info stealer.
Trend Micro’s research (published January 19th) revealed that threat actors have been systematically weaponizing VS Code extensions to target software developers specifically. The Evelyn stealer is designed to exfiltrate:
- Developer credentials
- SSH keys
- API tokens
- Cryptocurrency wallet information
- Source code repositories
The DLL Hijacking Technique
The malware uses a sophisticated technique called DLL hijacking (or DLL sideloading). Here’s how it works:
When Screen Connect launches, it loads various dynamic link libraries (DLLs) from its installation directory. The malware places a malicious DLL with the same name in that directory. When Screen Connect tries to load the legitimate DLL, it loads the malicious one instead—giving the attacker’s code execution privileges.
This technique is particularly effective because:
- It doesn’t modify the original executable
- It exploits legitimate software’s normal behavior
- It’s difficult for antivirus software to detect
- It requires no user interaction after installation
The Attack Chain: Step by Step
How the Infection Unfolds
| Stage | Action | Risk Level | Detection Difficulty |
|---|---|---|---|
| 1. Download | User downloads fake extension from VS Code marketplace | Medium | Easy |
| 2. Installation | Extension installs and activates on VS Code startup | Medium | Easy |
| 3. Configuration Fetch | Malware retrieves instructions from attacker’s server | High | Medium |
| 4. Payload Download | Screen Connect installer and malicious DLLs downloaded | High | Medium |
| 5. Execution | Screen Connect installs as a Windows service | Critical | Hard |
| 6. Persistence | Malware maintains access across reboots | Critical | Very Hard |
| 7. Exfiltration | Attacker gains remote access and steals data | Critical | Very Hard |
The Configuration File Mystery
The malware attempts to fetch a configuration file from claudebot.get-into-pc.site/config.json. This file contains instructions about what to download and execute. Interestingly, the configuration file references executable names that don’t actually exist at that URL—suggesting either:
- The campaign is still being refined
- Files were removed after discovery
- The attack chain has multiple fallback mechanisms
The presence of fallback mechanisms is particularly concerning. If the primary attack fails, the malware has backup plans to ensure infection.
Warning Signs: How to Spot the Fake Extension
Red Flags to Watch For
Before you install any VS Code extension, check for these warning signs:
1. Verify the Publisher
- Check if the extension is published by the official organization
- Look for verified badges and publisher information
- Visit the official website to confirm
2. Examine the Repository
- Click the GitHub link provided
- Verify the repository actually exists and is actively maintained
- Check if the code matches the extension’s description
3. Read Recent Reviews
- Look for security warnings in comments
- Check the review history for sudden changes
- Be suspicious of newly released extensions with few reviews
4. Analyze the Description
- Legitimate extensions have detailed, professional descriptions
- Vague or generic descriptions are a red flag
- Check for spelling and grammar errors (common in malware)
5. Check Installation Numbers
- Newly released extensions with thousands of installations are suspicious
- Legitimate extensions typically grow gradually
- A sudden spike in installations warrants investigation
6. Examine Permissions
- Hover over the extension to see what permissions it requests
- Be cautious of extensions requesting unusual access
- Legitimate AI assistants shouldn’t need access to your file system
The Claudebot Extension Specifically
The fake Claudebot extension exhibited multiple red flags:
- No official GitHub repository (or a fake one)
- Vague overview and description
- No clear indication of what the extension actually does
- Suspicious configuration URLs
- Recently released with minimal documentation
The Broader Security Implications
Why AI Assistants Create Security Challenges
The concept of an AI that can access your emails, calendar, and digital footprint is inherently risky. Even legitimate implementations face security challenges:
Attack Surface Expansion
- More access points for attackers to exploit
- Increased data exposure if compromised
- Potential for prompt injection attacks
Credential Management
- AI assistants need credentials to access your accounts
- Storing these credentials securely is challenging
- Compromise of the AI means compromise of all connected accounts
Trust and Verification
- How do you verify the AI is doing what it claims?
- What happens to data the AI accesses?
- Who has access to your information?
Mitigating the Risks
Most legitimate AI assistants (including the real Claudebot) use local-only interfaces by default. They listen only on localhost (127.0.0.1) rather than exposing themselves to the internet. Access tokens are randomly generated and change frequently. However, users who expose these systems to the internet without proper security measures create significant vulnerabilities.
Protecting Yourself: A Practical Guide
Immediate Actions
1. Audit Your VS Code Extensions
- Open VS Code and go to the Extensions panel
- Review every installed extension
- Remove anything you don’t recognize or trust
- Check the publisher of each extension
2. Check for Compromise
- Look for unexpected services running on your computer
- Check Windows Services for Screen Connect or similar tools
- Review your network connections for suspicious activity
- Run a full antivirus scan
3. Change Your Credentials
- Update passwords for all sensitive accounts
- Regenerate API tokens and SSH keys
- Check for unauthorized access in account logs
- Enable two-factor authentication everywhere
Long-Term Security Practices
Download Extensions Safely
- Only download from the official VS Code marketplace
- Verify the publisher before installation
- Read recent reviews and check for security warnings
- Start with a small number of trusted extensions
Stay Informed
- Follow security researchers and organizations
- Subscribe to security bulletins for tools you use
- Join developer communities that discuss security
- Report suspicious extensions immediately
Use Defense in Depth
- Run antivirus software and keep it updated
- Use a firewall and monitor network activity
- Keep your operating system and software patched
- Use a password manager for credential security
Verify Before Trusting
- When a new tool goes viral, wait for security analysis
- Check official websites and social media for announcements
- Be skeptical of extensions that appear suddenly
- Trust your instincts—if something feels off, it probably is
The Bigger Picture: Hype and Exploitation
Why This Keeps Happening
Cybercriminals have discovered a reliable formula:
- Wait for hype: A new technology goes viral
- Exploit excitement: People are eager and less cautious
- Create fakes: Build convincing imitations
- Profit: Collect victims before discovery
This pattern repeats with every new trend. Cryptocurrency booms? Fake wallets appear. NFTs explode? Fake marketplaces emerge. AI assistants trend? Malicious extensions follow.
The Role of Trust
The fake Claudebot extension worked because it exploited trust in multiple ways:
- Trust in the VS Code marketplace (assumed to be safe)
- Trust in the AI hype (everyone’s talking about it, so it must be real)
- Trust in the professional presentation (it looked legitimate)
- Trust in automation (extensions are supposed to help, not harm)
The Responsibility Shared
Preventing these attacks requires action from multiple parties:
Platform Providers (Microsoft, GitHub)
- Implement stricter vetting for new extensions
- Monitor for suspicious activity patterns
- Respond quickly to security reports
- Educate users about risks
Researchers and Security Teams
- Analyze new threats quickly
- Share findings publicly
- Provide detailed technical information
- Help users understand risks
Users and Developers
- Stay skeptical and informed
- Report suspicious extensions
- Follow security best practices
- Share warnings with colleagues
What Happened to Version 3.0?
The Evolution of the Malware
Interestingly, when researchers examined version 3.0 of the fake Claudebot extension, they found something unexpected: the malicious code was largely removed or non-functional. The extension had been updated to include features like “Dark AI” but the infection mechanisms were gone.
This suggests several possibilities:
- The attackers abandoned the campaign after discovery
- The code was intentionally broken to avoid detection
- The attack infrastructure was taken down
- The malware evolved into a different form
The takeaway? Threat actors adapt quickly. Just because one version of malware is neutralized doesn’t mean the threat is over.
Key Takeaways: What You Need to Remember
The Essentials
✓ The fake Claudebot extension is a remote access trojan disguised as a legitimate AI assistant tool
✓ Screen Connect is the payload—legitimate software weaponized for malicious purposes
✓ The attack exploits hype and trust—people were excited about AI and didn’t question the extension’s legitimacy
✓ DLL hijacking is the technique—malware intercepts legitimate software’s normal operations
✓ This is part of a larger campaign—the Evelyn info stealer and similar threats target developers specifically
✓ Verification is your best defense—always check publishers, repositories, and reviews before installing anything
Final Thoughts: Staying Safe in a Hyped-Up World
The fake Claudebot extension is a reminder that excitement and caution must coexist. New technology is thrilling, but it’s also a hunting ground for attackers. Every viral trend creates opportunities for exploitation.
The good news? You’re not helpless. By understanding how these attacks work, recognizing warning signs, and following security best practices, you can protect yourself. The key is staying informed, remaining skeptical, and remembering that if something seems too good to be true—or too perfectly timed with the latest hype—it probably is.
The next time a new AI tool, extension, or application goes viral, take a breath. Do your research. Verify the source. Check the reviews. Wait for security analysis. Your future self will thank you.
Have you encountered suspicious extensions or malware? Share your experience in the comments below. Your story might help protect others.