- **Q: How can I protect myself from SleepyDuck malware?
**
Cybersecurity / Vulnerabilities
Cybersecurity researchers have uncovered two significant threats: the SleepyDuck malware targeting Solidity developers via a malicious VS Code extension, and ongoing BADCANDY attacks exploiting a critical vulnerability in Cisco IOS XE devic...
**SleepyDuck Malware**
The SleepyDuck malware is distributed through a rogue VS Code extension named "juan-bianco.solidity-vlang" on the Open VSX registry. The extension was initially benign but was updated with malicious capabilities after gaining traction. It uses an Ethereum smart contract to update its command-and-control (C2) server address, ensuring redundancy and persistence.
When activated, the malware collects system information and sets up a command execution sandbox. It communicates with a remote server to receive commands, posing a significant risk to developers working with Solidity.
**BADCANDY Attacks**
The BADCANDY attacks exploit CVE-2023-20198, a critical vulnerability in Cisco IOS XE devices. The vulnerability allows attackers to create an account with elevated privileges and seize control of the system. The ASD has detected ongoing attacks since October 2023, with a surge in compromised devices in Australia.
BADCANDY is a Lua-based web shell that lacks a persistence mechanism, meaning it does not survive system reboots. However, attackers are able to detect when the implant is removed and reinfect the devices if they remain unpatched.
**
**
Do you think these types of attacks will become more common? Share your thoughts in the comments below!
Share this article with others who need to stay ahead of this trend!
This article was compiled by Yanuki using publicly available data and trending information. The content may summarize or reference third-party sources that have not been independently verified. While we aim to provide timely and accurate insights, the information presented may be incomplete or outdated.
All content is provided for general informational purposes only and does not constitute financial, legal, or professional advice. Yanuki makes no representations or warranties regarding the reliability or completeness of the information.
This article may include links to external sources for further context. These links are provided for convenience only and do not imply endorsement.
Always do your own research (DYOR) before making any decisions based on the information presented.