How a Dual-Vector Phish Hijacked VS Code for C2?

Article Highlights
Off On

Trust was the opening move in a campaign that blended social engineering with developer-grade misdirection, as attackers impersonated an internal consultant, invoked the real “Safe Jail Project,” and quietly steered staff at the Punjab Safe Cities Authority and PPIC3 toward what looked like routine paperwork but concealed a pair of booby-trapped files. The email carried “CAD Reprot.doc” and “ANPR Reprot.pdf,” each misspelled to mimic casual internal naming and each wired to a separate infection chain that converged on the same BunnyCDN-hosted payloads. By splitting the path but unifying the destination, the operators drove up success odds while keeping network indicators sparse and familiar. Staged delivery, macro obfuscation, and legitimate cloud services did the rest, making hostile traffic look like everyday collaboration and leaving defenders to sift signals that felt indistinguishable from normal enterprise activity.

The Setup: Social Engineering and Dual Delivery

The lure hinged on proximity and plausibility: a sender framed as an internal consultant referencing the Safe Jail Project, a real initiative that lends instant credibility among public safety staff accustomed to process-heavy correspondence. Misspellings like “Reprot” functioned as deliberate noise—common enough in everyday files to avoid suspicion, yet unique enough to bypass simple hash or name-based filters. The dual-attachment tactic was not redundancy for its own sake; it created parallel routes to the same infrastructure so that if one vector stumbled on policy controls or user friction, the other could still land. Both files ultimately drew from BunnyCDN, allowing outbound traffic to blend with ordinary content delivery patterns and sidestep crude allowlists. This approach naturally leads to a broader theme: hide in plain sight to compress detection dwell time.

The Word document leaned on VBA stomping, stripping readable macro source and leaving only compiled p‑code that thwarts many static scanners and casual analyst triage. After the predictable “Enable Content” nudge, a concealed routine spun up a COM-based HTTP object, fetched a payload named code.exe, and wrote it into the temp directory with ADODB.Stream before execution. In contrast, the PDF never needed embedded exploits; it presented a bogus Adobe Reader error that funneled the user toward an unsigned .NET ClickOnce installer pretending to be a required viewer update. Different mechanisms, same outcome: execution of an attacker-controlled binary from a cloud edge familiar to corporate networks. Building on this foundation, the operators ensured either click path could establish a foothold, turning a single spear-phish into two independent compromises with one C2 backbone.

Covert Control: VS Code Tunnels, Evidence, and Defensive Plays

Once code.exe ran, command-and-control traffic pivoted through Microsoft’s Visual Studio Code tunnel service, a legitimate feature that developers use for remote port forwarding and secure access to local environments. By repurposing that channel, the actor made callbacks resemble everyday dev workflows—workstation beacons looked like tunnel handshakes, and endpoint processes mirrored normal IDE adjuncts. Instant compromise alerts traveled via Discord webhooks, a low-friction signal path that rides standard HTTPS and blends into collaboration noise. Analysts assessed persistent remote access as the engineered goal, reinforced by the tunnel’s bidirectional flexibility and the convenience of webhook-based telemetry. This was not commodity smash-and-grab; it was patient access with a cover story: routine code sync, a harmless CDN request, and a dev tunnel that few enterprises watch outside engineering teams.

Attribution signals pointed to bespoke tooling rather than a recycled family. JoeReverser and Joe Sandbox correlated the full chain (Web IDs 1903908, 1903907, 1903906) and flagged the Word lure with a 100/100 malicious score across sandbox runs. Suricata rules, Sigma detections, and YARA hits independently stacked confidence, while ReversingLabs at 52% and VirusTotal at 56% indicated consistent cross-vendor suspicion even before deep hunts completed. The absence of a Malpedia match suggested a custom kit tailored to Pakistani government environments. For defenders, the pressure points were clear and actionable: restrict or allow-list CDN destinations where feasible, baseline VS Code tunnel activity on endpoints that should not host developer stacks, and flag outbound Discord webhooks originating from non-browser processes. In practice, those measures applied friction precisely where the operation depended on trust in familiar platforms, reducing attacker room to maneuver without blanket blocks that disrupt daily work.

Explore more

Can AI Restore Meaning and Purpose to the Modern Workplace?

The traditional boundaries of corporate efficiency are currently undergoing a radical transformation as organizations realize that silicon-based intelligence performs best when it serves as a scaffold for human creativity rather than a replacement for it. While artificial intelligence continues to reshape every corner of the global economy, the most successful enterprises are uncovering a profound truth: the ultimate value of

Trend Analysis: Generative AI in Talent Management

The rapid assimilation of generative artificial intelligence into the corporate structure has reached a point where the very tasks once considered the bedrock of professional apprenticeships are being systematically automated into oblivion. While the promise of near-instantaneous productivity is undeniably attractive to the modern executive, a quiet crisis is brewing beneath the surface of the organizational chart. This paradox of

B2B Marketing Must Pivot to Content Reinvestment by 2027

The traditional architecture of digital demand generation is currently fracturing under the immense weight of generative search engines that answer complex buyer queries without ever requiring a click. For over two decades, the operational framework of B2B marketing remained remarkably consistent, relying on a linear progression where search engine optimization drove traffic to corporate websites to exchange gated white papers

How Is AI Reshaping the Modern B2B Buyer Journey?

The silent transformation of the B2B buyer journey has reached a critical juncture where the majority of research occurs long before a sales representative ever enters the conversation. This shift toward self-directed, AI-facilitated exploration has redefined the requirements for agency leadership. To address these evolving dynamics, Allytics has officially promoted Jeff Wells to Vice President, placing him at the helm

FinTurk Launches AI-Powered CRM for Financial Advisors

The modern wealth management office often feels like a digital contradiction where advisors utilize sophisticated market algorithms while simultaneously fighting a losing battle against static spreadsheets and rigid database entries. For decades, the financial industry has tolerated customer relationship management systems that function more like electronic filing cabinets than dynamic business tools. FinTurk enters this landscape with a bold proposition