How a Dual-Vector Phish Hijacked VS Code for C2?

Article Highlights
Off On

Trust was the opening move in a campaign that blended social engineering with developer-grade misdirection, as attackers impersonated an internal consultant, invoked the real “Safe Jail Project,” and quietly steered staff at the Punjab Safe Cities Authority and PPIC3 toward what looked like routine paperwork but concealed a pair of booby-trapped files. The email carried “CAD Reprot.doc” and “ANPR Reprot.pdf,” each misspelled to mimic casual internal naming and each wired to a separate infection chain that converged on the same BunnyCDN-hosted payloads. By splitting the path but unifying the destination, the operators drove up success odds while keeping network indicators sparse and familiar. Staged delivery, macro obfuscation, and legitimate cloud services did the rest, making hostile traffic look like everyday collaboration and leaving defenders to sift signals that felt indistinguishable from normal enterprise activity.

The Setup: Social Engineering and Dual Delivery

The lure hinged on proximity and plausibility: a sender framed as an internal consultant referencing the Safe Jail Project, a real initiative that lends instant credibility among public safety staff accustomed to process-heavy correspondence. Misspellings like “Reprot” functioned as deliberate noise—common enough in everyday files to avoid suspicion, yet unique enough to bypass simple hash or name-based filters. The dual-attachment tactic was not redundancy for its own sake; it created parallel routes to the same infrastructure so that if one vector stumbled on policy controls or user friction, the other could still land. Both files ultimately drew from BunnyCDN, allowing outbound traffic to blend with ordinary content delivery patterns and sidestep crude allowlists. This approach naturally leads to a broader theme: hide in plain sight to compress detection dwell time.

The Word document leaned on VBA stomping, stripping readable macro source and leaving only compiled p‑code that thwarts many static scanners and casual analyst triage. After the predictable “Enable Content” nudge, a concealed routine spun up a COM-based HTTP object, fetched a payload named code.exe, and wrote it into the temp directory with ADODB.Stream before execution. In contrast, the PDF never needed embedded exploits; it presented a bogus Adobe Reader error that funneled the user toward an unsigned .NET ClickOnce installer pretending to be a required viewer update. Different mechanisms, same outcome: execution of an attacker-controlled binary from a cloud edge familiar to corporate networks. Building on this foundation, the operators ensured either click path could establish a foothold, turning a single spear-phish into two independent compromises with one C2 backbone.

Covert Control: VS Code Tunnels, Evidence, and Defensive Plays

Once code.exe ran, command-and-control traffic pivoted through Microsoft’s Visual Studio Code tunnel service, a legitimate feature that developers use for remote port forwarding and secure access to local environments. By repurposing that channel, the actor made callbacks resemble everyday dev workflows—workstation beacons looked like tunnel handshakes, and endpoint processes mirrored normal IDE adjuncts. Instant compromise alerts traveled via Discord webhooks, a low-friction signal path that rides standard HTTPS and blends into collaboration noise. Analysts assessed persistent remote access as the engineered goal, reinforced by the tunnel’s bidirectional flexibility and the convenience of webhook-based telemetry. This was not commodity smash-and-grab; it was patient access with a cover story: routine code sync, a harmless CDN request, and a dev tunnel that few enterprises watch outside engineering teams.

Attribution signals pointed to bespoke tooling rather than a recycled family. JoeReverser and Joe Sandbox correlated the full chain (Web IDs 1903908, 1903907, 1903906) and flagged the Word lure with a 100/100 malicious score across sandbox runs. Suricata rules, Sigma detections, and YARA hits independently stacked confidence, while ReversingLabs at 52% and VirusTotal at 56% indicated consistent cross-vendor suspicion even before deep hunts completed. The absence of a Malpedia match suggested a custom kit tailored to Pakistani government environments. For defenders, the pressure points were clear and actionable: restrict or allow-list CDN destinations where feasible, baseline VS Code tunnel activity on endpoints that should not host developer stacks, and flag outbound Discord webhooks originating from non-browser processes. In practice, those measures applied friction precisely where the operation depended on trust in familiar platforms, reducing attacker room to maneuver without blanket blocks that disrupt daily work.

Explore more

Trend Analysis: Hybrid Data Center Cooling

AI-scale heat now arrives faster than facility upgrades can catch up, pushing operators to blend air and liquid in the same white space to tap stranded power, protect SLAs, and stretch budgets without gutting mechanical plants. This hybrid path preserves existing assets, trims PUE and WUE, and redirects CAPEX toward compute, not wholesale rebuilds. Why Hybrid Cooling Is Accelerating in

Are Old Cyber Threats Winning on New, Trusted Frontiers?

The Week Trust Got Complicated—Familiar Threats on Modern Rails The week’s breach tape read like a déjà vu playlist scored for modern instruments, as red teams and incident responders pointed to old-school tactics—social engineering, credential theft, backdoors—riding on the rails of “trusted” channels such as browser extensions, remote management tools, CI/CD systems, and even AI agents that browse and click

Can a Texas-First Data Center Scale From 100MW to 1GW?

Dominic Jainy is an IT professional steeped in AI, machine learning, and blockchain who studies how real infrastructure unlocks heavy compute. In this conversation, he digs into a Texas-first campus that starts at 100MW in Glasscock County and is engineered to scale toward 1GW. The themes span speed-to-power, behind-the-meter gas, ERCOT integration, and AI-ready design, all anchored in local execution

Maine Governor Vetoes Data Center Moratorium, Orders Review

Maine’s high-profile veto of a blanket data center moratorium reshaped the balance between economic revival, grid reliability, and environmental stewardship while signaling how states may govern AI-era computing growth. The decision turned a statewide pause into a targeted oversight push, reframing risk as something to be managed with standards rather than stopped outright. For investors, utilities, and communities, the move

Have You Patched Notepad++ Find in Files CVEs Yet?

Routine text searches were meant to speed up work, yet a flaw in Notepad++ turned a familiar shortcut into a subtle risk when a crafted string could crash the app or spill memory details that help attackers line up their next move. The issue centered on how the Find in Files feature rendered results, and it showed why even small