Loading
Yanuki
ARTICLE DETAIL
SleepyDuck Malware and BADCANDY Attacks Target Developers and Cisco Devices | Conduent Data Breach Impacts Millions: What You Need to Know | Conduent Data Breach Exposes Millions of Americans | Why Smart People Fall For Phishing Attacks | Building AI-Enabled Cybersecurity Resilience | CISOs to Pour 2026 Budgets into AI as Cybersecurity Priorities Shift | Record Data Breaches in 2025: Key Takeaways and What It Means for You | Why Incident Response Plans Often Fail | Data Breaches Hit Record High in 2025: Steps to Protect Your Data | SleepyDuck Malware and BADCANDY Attacks Target Developers and Cisco Devices | Conduent Data Breach Impacts Millions: What You Need to Know | Conduent Data Breach Exposes Millions of Americans | Why Smart People Fall For Phishing Attacks | Building AI-Enabled Cybersecurity Resilience | CISOs to Pour 2026 Budgets into AI as Cybersecurity Priorities Shift | Record Data Breaches in 2025: Key Takeaways and What It Means for You | Why Incident Response Plans Often Fail | Data Breaches Hit Record High in 2025: Steps to Protect Your Data

Cybersecurity / Vulnerabilities

SleepyDuck Malware and BADCANDY Attacks Target Developers and Cisco Devices

Cybersecurity researchers have uncovered two significant threats: the SleepyDuck malware targeting Solidity developers via a malicious VS Code extension, and ongoing BADCANDY attacks exploiting a critical vulnerability in Cisco IOS XE devic...

Malicious VSX Extension "SleepyDuck" Uses Ethereum to Keep Its Command Server Alive
Share
X LinkedIn

cybersecurity news today
SleepyDuck Malware and BADCANDY Attacks Target Developers and Cisco Devices Image via The Hacker News

Key Insights

  • **SleepyDuck Malware:** Disguised as a benign Solidity extension in the Open VSX registry, SleepyDuck uses Ethereum contracts to maintain its command server, ensuring persistence even if the primary server is taken down. Why this matters: This technique allows malware to evade traditional takedown methods, posing a long-term threat to developers.
  • **BADCANDY Attacks:** The Australian Signals Directorate (ASD) warns of ongoing attacks exploiting CVE-2023-20198 in Cisco IOS XE devices, using the BADCANDY implant. Why this matters: Unpatched Cisco devices are vulnerable to remote takeover, potentially leading to significant network breaches and data compromise.

In-Depth Analysis

**SleepyDuck Malware**

The SleepyDuck malware is distributed through a rogue VS Code extension named "juan-bianco.solidity-vlang" on the Open VSX registry. The extension was initially benign but was updated with malicious capabilities after gaining traction. It uses an Ethereum smart contract to update its command-and-control (C2) server address, ensuring redundancy and persistence.

When activated, the malware collects system information and sets up a command execution sandbox. It communicates with a remote server to receive commands, posing a significant risk to developers working with Solidity.

**BADCANDY Attacks**

The BADCANDY attacks exploit CVE-2023-20198, a critical vulnerability in Cisco IOS XE devices. The vulnerability allows attackers to create an account with elevated privileges and seize control of the system. The ASD has detected ongoing attacks since October 2023, with a surge in compromised devices in Australia.

BADCANDY is a Lua-based web shell that lacks a persistence mechanism, meaning it does not survive system reboots. However, attackers are able to detect when the implant is removed and reinfect the devices if they remain unpatched.

Read source article

FAQ

- **Q: How can I protect myself from SleepyDuck malware?

**

- **Q: What should I do if my Cisco IOS XE device is vulnerable to BADCANDY?

**

Takeaways

  • Developers should be vigilant about the VS Code extensions they install and verify their authenticity.
  • System administrators must promptly patch Cisco IOS XE devices to mitigate the risk of BADCANDY attacks.
  • Both threats highlight the importance of robust cybersecurity practices, including continuous monitoring and proactive threat detection.

Discussion

Do you think these types of attacks will become more common? Share your thoughts in the comments below!

Share this article with others who need to stay ahead of this trend!

Sources

Disclaimer

This article was compiled by Yanuki using publicly available data and trending information. The content may summarize or reference third-party sources that have not been independently verified. While we aim to provide timely and accurate insights, the information presented may be incomplete or outdated.

All content is provided for general informational purposes only and does not constitute financial, legal, or professional advice. Yanuki makes no representations or warranties regarding the reliability or completeness of the information.

This article may include links to external sources for further context. These links are provided for convenience only and do not imply endorsement.

Always do your own research (DYOR) before making any decisions based on the information presented.