• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers weaponize visual studio code remote tunnels for cyber espionage

Hackers Weaponize Visual Studio Code Remote Tunnels for Cyber Espionage

You are here: Home / General Cyber Security News / Hackers Weaponize Visual Studio Code Remote Tunnels for Cyber Espionage
December 10, 2024

A suspected China-nexus cyber espionage group has been attributed to an attacks targeting large business-to-business IT service providers in Southern Europe as part of a campaign codenamed Operation Digital Eye.

The intrusions took place from late June to mid-July 2024, cybersecurity companies SentinelOne SentinelLabs and Tinexta Cyber said in a joint report shared with The Hacker News, adding the activities were detected and neutralized before they could progress to the data exfiltration phase.

“The intrusions could have enabled the adversaries to establish strategic footholds and compromise downstream entities,” security researchers Aleksandar Milenkoski and Luigi Martire said.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“The threat actors abused Visual Studio Code and Microsoft Azure infrastructure for C2 [command-and-control] purposes, attempting to evade detection by making malicious activities appear legitimate.”

It’s currently not known which China-linked hacking group is behind the attacks, an aspect complicated by the widespread toolset and infrastructure sharing among threat actors aligned with the East Asian nation.

Cybersecurity

Central to Operation Digital Eye is the weaponization of Microsoft Visual Studio Code Remote Tunnels for C2, a legitimate feature that enables remote access to endpoints, granting attackers the ability to execute arbitrary commands and manipulate files.

Part of why government-backed hackers use such public cloud infrastructure is so that their activity blends into the typical traffic seen by network defenders. Furthermore, such activities employ legitimate executables that are not blocked by application controls and firewall rules.

Attack chains observed by the companies entail the use of SQL injection as an initial access vector to breach internet-facing applications and database servers. The code injection is accomplished by means of a legitimate penetration testing tool called SQLmap that automates the process of detecting and exploiting SQL injection flaws.

A successful attack is followed by the deployment of a PHP-based web shell dubbed PHPsert that enables the threat actors to maintain a foothold and establish persistent remote access. Subsequent steps include reconnaissance, credential harvesting, and lateral movement to other systems in the network using Remote Desktop Protocol (RDP) and pass-the-hash techniques.

“For the pass-the-hash attacks, they used a custom modified version of Mimikatz,” the researchers said. The tool “enables the execution of processes within a user’s security context by leveraging a compromised NTLM password hash, bypassing the need for the user’s actual password.”

Visual Studio Code Remote Tunnels

Substantial source code overlaps suggest that the bespoke tool originates from the same source as the ones observed exclusively in suspected Chinese cyber espionage activities, such as Operation Soft Cell and Operation Tainted Love. These custom Mimikatz modifications, which also include shared code-signing certificates and the use of unique custom error messages or obfuscation techniques, have been collectively titled mimCN.

“The long-term evolution and versioning of mimCN samples, along with notable features such as instructions left for a separate team of operators, suggest the involvement of a shared vendor or digital quartermaster responsible for the active maintenance and provisioning of tooling,” the researchers pointed out.

“This function within the Chinese APT ecosystem, corroborated by the I-Soon leak, likely plays a key role in facilitating China-nexus cyber espionage operations.”

Also of note is the reliance on SSH and Visual Studio Code Remote Tunnels for remote command execution, with the attackers using GitHub accounts for authenticating and connecting to the tunnel in order to access the compromised endpoint through the browser-based version of Visual Studio Code (“vscode[.]dev”).

That said, it’s not known if the threat actors utilized freshly self-registered or already compromised GitHub accounts to authenticate to the tunnels.

Cybersecurity

Besides mimCN, some of the other aspects that point to China are the presence of simplified Chinese comments in PHPsert, the use of infrastructure provided by Romanian hosting service provider M247, and the use of Visual Studio Code as a backdoor, the last of which has been attributed to the Mustang Panda actor.

Furthermore, the investigation found that the operators were primarily active in the targeted organizations’ networks during typical working hours in China, mostly between 9 a.m. and 9 p.m. CST.

“The campaign underscores the strategic nature of this threat, as breaching organizations that provide data, infrastructure, and cybersecurity solutions to other industries gives the attackers a foothold in the digital supply chain, enabling them to extend their reach to downstream entities,” the researchers said.

“The abuse of Visual Studio Code Remote Tunnels in this campaign illustrates how Chinese APT groups often rely on practical, solution-oriented approaches to evade detection. By leveraging a trusted development tool and infrastructure, the threat actors aimed to disguise their malicious activities as legitimate.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «ongoing phishing and malware campaigns in december 2024 Ongoing Phishing and Malware Campaigns in December 2024
Next Post: Phone Phishing Gang Busted: Eight Arrested in Belgium and Netherlands phone phishing gang busted: eight arrested in belgium and netherlands»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.