The Fake Claudebot VS Code Extension Scam: How Hackers Are Weaponizing AI Hype to Deploy Remote Access Malware

 When AI Excitement Becomes a Security Nightmare

The internet went absolutely wild this past weekend. Everyone was talking about Claudebot—the new personal AI assistant that supposedly “just does things” and gets stuff done. But while the tech community was buzzing with excitement, something sinister was brewing in the shadows. Cybercriminals didn’t miss a beat. They spotted an opportunity in the hype and created a fake Claudebot VS Code extension that’s actually a trojan horse for remote access malware. This isn’t just another security scare—it’s a masterclass in how attackers exploit our enthusiasm for new technology.


The Rise of Claudebot: What Everyone’s Talking About

Understanding the Legitimate AI Assistant

Claudebot (recently renamed to Moltbot after Anthropic’s request) burst onto the scene as a revolutionary personal AI assistant. The concept is simple yet powerful: an AI that doesn’t just answer questions but actually executes tasks on your behalf. Imagine an assistant that can access your emails, manage your calendar, and handle your digital workflows—all autonomously.

The appeal is undeniable. Developers, professionals, and tech enthusiasts immediately recognized the potential. Live streams about Claudebot’s capabilities flooded YouTube, Twitch, LinkedIn, and Twitter. The energy was electric. But as with any viral technology, where there’s hype, there are predators waiting to exploit it.

Why Cybercriminals Love Trending Technology

Here’s the uncomfortable truth: hackers don’t innovate in a vacuum. They ride the wave of whatever’s trending. When something goes viral, millions of people are suddenly interested, distracted, and—most importantly—less cautious. They’re so excited about the new technology that they skip security steps. They download from untrusted sources. They ignore warning signs.

This is exactly what happened with the fake Claudebot extension.

Claudebot


The Malicious Extension: How the Scam Works

The Fake VS Code Extension Exposed

The Aikido security team, led by researcher Charlie Ericson, uncovered something alarming: a malicious Visual Studio Code extension masquerading as the official Claudebot agent. Here’s what makes this particularly dangerous: the real Claudebot team has never published an official VS Code extension.

Let that sink in. The extension doesn’t exist legitimately, but it existed on the VS Code marketplace anyway.

The extension was presented with professional polish. It had an icon, an emoji-filled description, and what looked like legitimate documentation. To an unsuspecting developer working late at night, it appeared completely authentic. The GitHub repository it referenced? Fake. The overview details? Vague and sketchy. But the marketing was just convincing enough to trick people into installing it.

What the Extension Actually Does

When you install this malware, it doesn’t immediately announce itself. Instead, it operates through a series of carefully orchestrated steps:

  1. Initial Activation: Upon VS Code startup, the extension triggers automatically through activation events
  2. Configuration Retrieval: It attempts to fetch a configuration file from a suspicious URL (claudebot.get-into-pc.site)
  3. Payload Download: Based on the configuration, it downloads and executes additional malicious files
  4. Remote Access Installation: The final payload is Screen Connect—a legitimate remote access tool weaponized to give attackers complete control of your machine

The Technical Breakdown

The extension’s code reveals its true nature. Inside the extension.js file, developers can see references to:

  • A config URL pointing to claudebot.get-into-pc.site
  • Functions designed to download and execute files
  • Fallback mechanisms if the primary attack fails
  • References to Screen Connect installation files

The code is wrapped in try-catch blocks—a technique used to silently fail if something goes wrong, ensuring the malware doesn’t crash and alert the user to its presence.


Screen Connect: The Weapon of Choice

What Is Screen Connect?

Screen Connect (originally called ConnectWise Control) is legitimate remote access software designed for IT support professionals. It allows technicians to remotely troubleshoot computers, fix problems, and provide customer support. It’s trusted. It’s official. It’s widely used across the industry.

And it’s the most abused remote access tool by cybercriminals.

Why Attackers Love Screen Connect

Think about it from a hacker’s perspective. If you install custom malware, antivirus software might flag it immediately. But Screen Connect? It’s signed by a trusted company. It’s recognized by security systems as legitimate software. Installing it is like hiding a bomb inside a birthday cake—the cake itself is perfectly innocent.

The weaponized version of Screen Connect works exactly like the legitimate version, except it connects to the attacker’s server instead of a legitimate support technician’s. Once connected, the attacker has complete remote access to your machine. They can:

  • Steal files and credentials
  • Install additional malware
  • Monitor your activities
  • Access sensitive information
  • Pivot to other systems on your network

The Remote Access Trojan (RAT) Connection

A Remote Access Trojan is malware that gives attackers unauthorized remote access to your computer. Screen Connect, when weaponized, becomes exactly that. The distinction between legitimate software and malware often comes down to intent—and in this case, the intent is purely malicious.


The Evelyn Info Stealer Connection

Uncovering a Larger Campaign

As researchers dug deeper, they discovered something even more troubling: this wasn’t an isolated incident. The fake Claudebot extension was connected to a larger, more sophisticated campaign involving the Evelyn info stealer.

Trend Micro’s research (published January 19th) revealed that threat actors have been systematically weaponizing VS Code extensions to target software developers specifically. The Evelyn stealer is designed to exfiltrate:

  • Developer credentials
  • SSH keys
  • API tokens
  • Cryptocurrency wallet information
  • Source code repositories

The DLL Hijacking Technique

The malware uses a sophisticated technique called DLL hijacking (or DLL sideloading). Here’s how it works:

When Screen Connect launches, it loads various dynamic link libraries (DLLs) from its installation directory. The malware places a malicious DLL with the same name in that directory. When Screen Connect tries to load the legitimate DLL, it loads the malicious one instead—giving the attacker’s code execution privileges.

This technique is particularly effective because:

  • It doesn’t modify the original executable
  • It exploits legitimate software’s normal behavior
  • It’s difficult for antivirus software to detect
  • It requires no user interaction after installation

The Attack Chain: Step by Step

How the Infection Unfolds

Stage Action Risk Level Detection Difficulty
1. Download User downloads fake extension from VS Code marketplace Medium Easy
2. Installation Extension installs and activates on VS Code startup Medium Easy
3. Configuration Fetch Malware retrieves instructions from attacker’s server High Medium
4. Payload Download Screen Connect installer and malicious DLLs downloaded High Medium
5. Execution Screen Connect installs as a Windows service Critical Hard
6. Persistence Malware maintains access across reboots Critical Very Hard
7. Exfiltration Attacker gains remote access and steals data Critical Very Hard

The Configuration File Mystery

The malware attempts to fetch a configuration file from claudebot.get-into-pc.site/config.json. This file contains instructions about what to download and execute. Interestingly, the configuration file references executable names that don’t actually exist at that URL—suggesting either:

  • The campaign is still being refined
  • Files were removed after discovery
  • The attack chain has multiple fallback mechanisms

The presence of fallback mechanisms is particularly concerning. If the primary attack fails, the malware has backup plans to ensure infection.


Warning Signs: How to Spot the Fake Extension

Red Flags to Watch For

Before you install any VS Code extension, check for these warning signs:

1. Verify the Publisher

  • Check if the extension is published by the official organization
  • Look for verified badges and publisher information
  • Visit the official website to confirm

2. Examine the Repository

  • Click the GitHub link provided
  • Verify the repository actually exists and is actively maintained
  • Check if the code matches the extension’s description

3. Read Recent Reviews

  • Look for security warnings in comments
  • Check the review history for sudden changes
  • Be suspicious of newly released extensions with few reviews

4. Analyze the Description

  • Legitimate extensions have detailed, professional descriptions
  • Vague or generic descriptions are a red flag
  • Check for spelling and grammar errors (common in malware)

5. Check Installation Numbers

  • Newly released extensions with thousands of installations are suspicious
  • Legitimate extensions typically grow gradually
  • A sudden spike in installations warrants investigation

6. Examine Permissions

  • Hover over the extension to see what permissions it requests
  • Be cautious of extensions requesting unusual access
  • Legitimate AI assistants shouldn’t need access to your file system

The Claudebot Extension Specifically

The fake Claudebot extension exhibited multiple red flags:

  • No official GitHub repository (or a fake one)
  • Vague overview and description
  • No clear indication of what the extension actually does
  • Suspicious configuration URLs
  • Recently released with minimal documentation

The Broader Security Implications

Why AI Assistants Create Security Challenges

The concept of an AI that can access your emails, calendar, and digital footprint is inherently risky. Even legitimate implementations face security challenges:

Attack Surface Expansion

  • More access points for attackers to exploit
  • Increased data exposure if compromised
  • Potential for prompt injection attacks

Credential Management

  • AI assistants need credentials to access your accounts
  • Storing these credentials securely is challenging
  • Compromise of the AI means compromise of all connected accounts

Trust and Verification

  • How do you verify the AI is doing what it claims?
  • What happens to data the AI accesses?
  • Who has access to your information?

Mitigating the Risks

Most legitimate AI assistants (including the real Claudebot) use local-only interfaces by default. They listen only on localhost (127.0.0.1) rather than exposing themselves to the internet. Access tokens are randomly generated and change frequently. However, users who expose these systems to the internet without proper security measures create significant vulnerabilities.


Protecting Yourself: A Practical Guide

Immediate Actions

1. Audit Your VS Code Extensions

  • Open VS Code and go to the Extensions panel
  • Review every installed extension
  • Remove anything you don’t recognize or trust
  • Check the publisher of each extension

2. Check for Compromise

  • Look for unexpected services running on your computer
  • Check Windows Services for Screen Connect or similar tools
  • Review your network connections for suspicious activity
  • Run a full antivirus scan

3. Change Your Credentials

  • Update passwords for all sensitive accounts
  • Regenerate API tokens and SSH keys
  • Check for unauthorized access in account logs
  • Enable two-factor authentication everywhere

Long-Term Security Practices

Download Extensions Safely

  • Only download from the official VS Code marketplace
  • Verify the publisher before installation
  • Read recent reviews and check for security warnings
  • Start with a small number of trusted extensions

Stay Informed

  • Follow security researchers and organizations
  • Subscribe to security bulletins for tools you use
  • Join developer communities that discuss security
  • Report suspicious extensions immediately

Use Defense in Depth

  • Run antivirus software and keep it updated
  • Use a firewall and monitor network activity
  • Keep your operating system and software patched
  • Use a password manager for credential security

Verify Before Trusting

  • When a new tool goes viral, wait for security analysis
  • Check official websites and social media for announcements
  • Be skeptical of extensions that appear suddenly
  • Trust your instincts—if something feels off, it probably is

The Bigger Picture: Hype and Exploitation

Why This Keeps Happening

Cybercriminals have discovered a reliable formula:

  1. Wait for hype: A new technology goes viral
  2. Exploit excitement: People are eager and less cautious
  3. Create fakes: Build convincing imitations
  4. Profit: Collect victims before discovery

This pattern repeats with every new trend. Cryptocurrency booms? Fake wallets appear. NFTs explode? Fake marketplaces emerge. AI assistants trend? Malicious extensions follow.

The Role of Trust

The fake Claudebot extension worked because it exploited trust in multiple ways:

  • Trust in the VS Code marketplace (assumed to be safe)
  • Trust in the AI hype (everyone’s talking about it, so it must be real)
  • Trust in the professional presentation (it looked legitimate)
  • Trust in automation (extensions are supposed to help, not harm)

The Responsibility Shared

Preventing these attacks requires action from multiple parties:

Platform Providers (Microsoft, GitHub)

  • Implement stricter vetting for new extensions
  • Monitor for suspicious activity patterns
  • Respond quickly to security reports
  • Educate users about risks

Researchers and Security Teams

  • Analyze new threats quickly
  • Share findings publicly
  • Provide detailed technical information
  • Help users understand risks

Users and Developers

  • Stay skeptical and informed
  • Report suspicious extensions
  • Follow security best practices
  • Share warnings with colleagues

What Happened to Version 3.0?

The Evolution of the Malware

Interestingly, when researchers examined version 3.0 of the fake Claudebot extension, they found something unexpected: the malicious code was largely removed or non-functional. The extension had been updated to include features like “Dark AI” but the infection mechanisms were gone.

This suggests several possibilities:

  • The attackers abandoned the campaign after discovery
  • The code was intentionally broken to avoid detection
  • The attack infrastructure was taken down
  • The malware evolved into a different form

The takeaway? Threat actors adapt quickly. Just because one version of malware is neutralized doesn’t mean the threat is over.


Key Takeaways: What You Need to Remember

The Essentials

✓ The fake Claudebot extension is a remote access trojan disguised as a legitimate AI assistant tool

✓ Screen Connect is the payload—legitimate software weaponized for malicious purposes

✓ The attack exploits hype and trust—people were excited about AI and didn’t question the extension’s legitimacy

✓ DLL hijacking is the technique—malware intercepts legitimate software’s normal operations

✓ This is part of a larger campaign—the Evelyn info stealer and similar threats target developers specifically

✓ Verification is your best defense—always check publishers, repositories, and reviews before installing anything


Final Thoughts: Staying Safe in a Hyped-Up World

The fake Claudebot extension is a reminder that excitement and caution must coexist. New technology is thrilling, but it’s also a hunting ground for attackers. Every viral trend creates opportunities for exploitation.

The good news? You’re not helpless. By understanding how these attacks work, recognizing warning signs, and following security best practices, you can protect yourself. The key is staying informed, remaining skeptical, and remembering that if something seems too good to be true—or too perfectly timed with the latest hype—it probably is.

The next time a new AI tool, extension, or application goes viral, take a breath. Do your research. Verify the source. Check the reviews. Wait for security analysis. Your future self will thank you.

Have you encountered suspicious extensions or malware? Share your experience in the comments below. Your story might help protect others.

Related Posts

Flipper Zero: The Pocket-Sized Security Tool That’s Changing Everything (And Why You Should Care)

The Device That Started as a Kickstarter Dream Imagine holding a device the size of a tamagotchi that can open locks, control your TV, and interact with your phone—all without…

Read more

Cracking the Code: Master Website Reconnaissance Today

Before hackers ever touch a keyboard to launch an attack, they’re already three steps ahead—gathering intelligence like detectives at a crime scene. Welcome to the world of website reconnaissance, where information…

Read more

Hacking Exposed: Protect Yourself Now

  Every 39 seconds, a hacker strikes somewhere in the world. By the time you finish reading this sentence, another cyberattack has already happened. Sounds terrifying, right? But here’s the…

Read more

The Dark Side of AI Jailbreaking: Why Security Teams Are Alarmed

 Why Everyone’s Talking About “AI Jailbreaking” AI jailbreaking has suddenly become one of the most talked-about topics in tech newsrooms, security forums, and developer chats. It’s dramatic, mysterious, and sounds…

Read more

Apple Contact Key Verification Security: A Silent Shield Against Impersonation

Introduction: Why Apple Contact Key Verification Security Exists For years, we obsessed over encryption. We locked messages with military-grade math. We protected files with public-private key pairs. We built digital…

Read more

7 Little-Known Online Security Tips Most People Ignore

Read This Before Your Data Becomes Someone Else’s Property Most people think they’re “safe online.” Strong passwords? Check. Two-factor authentication? Check. And yet… people still get hacked every single day….

Read more

Leave a Reply

Your email address will not be published. Required fields are marked *