A malicious Visual Studio Code extension named “ClawdBot Agent - AI Coding Assistant” was discovered on the official VS Code Extension Marketplace, posing as a free AI coding assistant while silently deploying remote access malware on Windows machines. The attack used quadruple impersonation tactics and weaponized legitimate IT support software.

Discovery

AttributeDetails
Detection dateJanuary 27, 2026
Discovered byAikido Security
Extension nameClawdBot Agent - AI Coding Assistant
Publisherclawdbot (clawdbot.clawdbot-agent)
Installs before removal77
StatusRemoved by Microsoft

Critical note: The real Clawdbot team never published an official VS Code extension. The attackers simply claimed the name first.

Attack chain

Stage 1: Extension installation

The malicious extension appears as a legitimate AI coding assistant:

  • Professional marketplace listing
  • Functional AI features (surface-level)
  • No obvious malicious indicators

Stage 2: Automatic activation

Every time VS Code launches, the extension:

  1. Activates automatically (no user interaction required)
  2. Contacts C2 server at clawdbot.getintwopc[.]site
  3. Retrieves config.json with instructions
  4. Suppresses error handling to prevent alerts

Stage 3: Payload delivery

The extension downloads and executes:

  • Code.exe — Malicious binary disguised as VS Code
  • Supporting DLLs for ScreenConnect deployment

Stage 4: ScreenConnect installation

ConnectWise ScreenConnect (legitimate remote desktop software) is installed and configured to connect to attacker infrastructure at meeting.bulletmailer[.]net:8041.

Stage 5: Persistent access

The attacker gains:

  • Full remote control of the system
  • Persistence across reboots
  • Access appearing as legitimate IT support traffic

Quadruple impersonation

The campaign employed sophisticated layered disguises:

LayerImpersonationPurpose
1Clawdbot AI assistantGain initial trust/installation
2Code.exe (VS Code binary)Blend with legitimate IDE files
3%TEMP%\Lightshot folderAppear as screenshot tool
4Zoom update (Dropbox)Backup delivery disguise

Each layer provides plausible explanation if any component is discovered.

Backup delivery mechanism

A Rust-based backup loader (DWrite.dll) provides redundancy:

ComponentFunction
DWrite.dllDLL sideloading attack vector
Dropbox payloadSame ScreenConnect installer
Zoom disguisePayload named as Zoom update

If the primary C2 fails, the backup fetches the same payload from Dropbox, ensuring delivery success.

”Bring Your Own ScreenConnect”

This attack uses a technique known as “Bring Your Own ScreenConnect” (or “RMM abuse”):

CharacteristicAdvantage for Attackers
Legitimate softwareTrusted by security tools
Signed binariesPasses code signing checks
IT support toolExpected network behavior
Encrypted trafficBlends with normal admin activity

IT support tools like ScreenConnect, AnyDesk, and TeamViewer are increasingly weaponized because security tools often allowlist them.

Infrastructure

ComponentValue
C2 domainclawdbot.getintwopc[.]site
Relay servermeeting.bulletmailer[.]net:8041
IP address178.16.54[.]253
HostingOmegatech LTD (Seychelles)
SSL cert issuedJanuary 10, 2026
Extension publishedJanuary 27, 2026

The infrastructure was established just 17 days before the extension appeared—indicating rapid operational tempo.

Impact assessment

Potential data exposure

If the extension was installed, attackers could access:

Data TypeRisk
Source codeFull repository access via VS Code
API keys/secretsEntered into extension or visible in code
CredentialsPassword managers, SSH keys
Development environmentCI/CD access, cloud credentials
Corporate networkLateral movement from developer machine

Developer targeting rationale

Developers are high-value targets:

  • Access to source code and intellectual property
  • Credentials for production systems
  • CI/CD pipeline access
  • Often have elevated privileges
  • Trust development tools implicitly

Remediation

If you installed ClawdBot Agent

StepAction
1Remove extension from VS Code
2Check for ScreenConnect at C:\Program Files (x86)\ScreenConnect Client (083e4d30c7ea44f7)\
3Uninstall ScreenConnect client service
4Delete %TEMP%\Lightshot directory
5Block C2 domains and IPs at firewall
6Rotate all credentials entered into extension
7Rotate API keys visible in open projects
8Scan for additional persistence mechanisms
9Report to security team for IR assessment

Indicators of compromise

Domains:

clawdbot.getintwopc[.]site
meeting.bulletmailer[.]net

IP addresses:

178.16.54[.]253

File paths:

C:\Program Files (x86)\ScreenConnect Client (083e4d30c7ea44f7)\
%TEMP%\Lightshot\

Processes:

ScreenConnect client service
Code.exe (in unexpected locations)

VS Code Marketplace security

This incident continues a troubling pattern:

TimeframeIncidents
Late 202519 malicious extensions discovered
January 2026ClawdBot Agent
OngoingAdditional campaigns likely

Marketplace limitations

ChallengeImpact
Open publishingAnyone can upload extensions
Limited vettingAutomated scans miss sophisticated malware
Name squattingAttackers claim legitimate product names
Trust by defaultUsers assume marketplace curation

Recommendations

For developers

PracticeBenefit
Verify publishersCheck official sources before installing
Review permissionsUnderstand what extensions can access
Check install countsLow counts may indicate new/suspicious extensions
Read reviewsLook for warnings from other users
Use organizational allowlistsOnly approved extensions

For organizations

ControlImplementation
Extension allowlistingCentrally managed approved list
EDR on developer machinesDetect ScreenConnect-style abuse
Network monitoringAlert on unexpected remote access tool traffic
Secret scanningDetect exposed credentials in repositories
Regular auditsReview installed extensions periodically

For extension verification

Before installing any VS Code extension:

  1. Check the publisher’s official website for extension links
  2. Verify the publisher ID matches official sources
  3. Review the extension’s source code if available
  4. Check when the extension was first published
  5. Look for verified publisher badges

Context

The ClawdBot attack demonstrates the maturation of developer tool supply chain attacks. By combining:

  • Name squatting of legitimate AI tools
  • Functional trojan behavior
  • Weaponized IT support software
  • Multiple fallback delivery mechanisms

…attackers create sophisticated campaigns that bypass traditional security controls.

The use of ScreenConnect is particularly clever—it’s legitimate software that security teams often allowlist, providing attackers with trusted, encrypted remote access that blends with normal IT operations.

Organizations should treat extension marketplace security with the same rigor applied to other software supply chain risks. Developer machines are high-value targets, and the tools developers trust implicitly are increasingly weaponized against them.