A new malware campaign is actively targeting software developers using a novel information stealer known as Evelyn Stealer. The malware is being distributed via malicious extensions for Microsoft Visual Studio Code, a widely used integrated development environment (IDE). According to research from Trend Micro and Koi Security, the primary goal of Evelyn Stealer is to exfiltrate developer credentials and cryptocurrency-related data from compromised machines. This campaign represents a significant supply chain threat, as developers are high-value targets with privileged access to source code, production systems, and cloud infrastructure. The abuse of the trusted VS Code Marketplace underscores the need for stringent security vetting of all development tools and dependencies.
The campaign leverages the popularity and extensibility of VS Code to trick developers into installing malicious extensions. Threat actors published at least three extensions to the official marketplace under the publisher name BigBlack. These extensions, named BigBlack.bitcoin-black, BigBlack.codo-ai, and BigBlack.mrbigblacktheme, likely masqueraded as useful tools or themes to lure developers.
Once installed, the malicious extension deploys the Evelyn Stealer payload. This malware is designed to scour the compromised system for sensitive information, with a focus on data valuable to cybercriminals:
The stolen data is then exfiltrated to an attacker-controlled server. By compromising a developer's workstation, attackers gain a powerful foothold within a target organization, potentially enabling lateral movement, source code theft, or the injection of malicious code into the software supply chain.
The attack vector is a software supply chain attack targeting the development environment. The threat actor abuses the trust developers place in the VS Code Marketplace.
T1195.002 - Compromise Software Supply Chain.T1059.007 - JavaScript.T1555 - Credentials from Password Stores.T1195.002 - Compromise Software Supply Chain: The core of the attack involves compromising a component of the software development toolchain (VS Code extensions).T1059.007 - JavaScript: VS Code extensions are built with JavaScript/TypeScript, which is used to execute the malicious payload.T1555 - Credentials from Password Stores: A primary objective of the malware is to steal credentials.T1552.001 - Credentials In Files: The stealer likely searches for credentials stored in configuration files, scripts, and text files.Compromising a developer workstation can have catastrophic consequences for an organization. Potential impacts include:
The following malicious VS Code extensions have been identified as Indicators of Compromise:
| Type | Value | Description |
|---|---|---|
| File Name | BigBlack.bitcoin-black |
Malicious VS Code Extension Name |
| File Name | BigBlack.codo-ai |
Malicious VS Code Extension Name |
| File Name | BigBlack.mrbigblacktheme |
Malicious VS Code Extension Name |
code --list-extensions) and compare against a list of known malicious and unapproved add-ons.Code.exe. Look for unexpected network connections, file system scanning behavior, or attempts to access credential stores originating from a VS Code process. This aligns with D3FEND's Process Analysis.Executable Allowlisting.Implement policies to restrict which extensions can be installed in developer IDEs, using an allowlist of approved and vetted tools.
Regularly audit developer environments, including installed IDE extensions, for signs of compromise or unauthorized software.
Prevent the storing of privileged credentials on developer workstations. Use secrets management and JIT access systems.
To counter threats like Evelyn Stealer, organizations must shift from a reactive to a proactive stance on developer tools. Implement a strict executable allowlisting policy specifically for Visual Studio Code extensions. This is not about blocking known-bad extensions, but only permitting known-good ones. Create a formal vetting process where developers can request a new extension. A security team or champion must then review the extension's publisher, permissions, community feedback, and source code if available. Once approved, the extension is added to a central allowlist that is enforced across all developer workstations using endpoint management tools or IDE workspace settings. This dramatically reduces the attack surface, as developers can no longer install arbitrary, unvetted extensions from the marketplace, effectively neutralizing the primary distribution vector for this type of malware.
Enhance endpoint security by focusing on process analysis for developer-specific applications like Visual Studio Code (Code.exe). Configure EDR and SIEM solutions to monitor for anomalous behavior originating from the VS Code process. A baseline of normal activity should be established. Alerts should be triggered if Code.exe or its child processes initiate suspicious actions such as: scanning large parts of the file system (especially user directories like ~/.ssh/ or ~/Documents/), making network connections to non-standard or uncategorized IP addresses, or attempting to read from browser credential stores. Since Evelyn Stealer's purpose is data exfiltration, monitoring for these specific data gathering and egress patterns is a critical detection strategy that can catch the malware post-installation, even if the initial entry point was missed.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats