<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Visual Studio Code — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/visual-studio-code/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/visual-studio-code/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detection of VScode Remote Tunneling for Command and Control</title><link>https://feed.craftedsignal.io/briefs/2024-09-vscode-tunnel/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-vscode-tunnel/</guid><description>The rule detects the execution of the VScode portable binary with the tunnel command line option, potentially indicating an attempt to establish a remote tunnel session to Github or a remote VScode instance for unauthorized access and command and control.</description><content:encoded><![CDATA[<p>This detection focuses on identifying the misuse of Visual Studio Code&rsquo;s (VScode) remote tunnel feature to establish unauthorized access or control over systems. While the VScode remote tunnel feature is designed to allow developers to connect to remote environments seamlessly, attackers can abuse this functionality for malicious purposes. The rule specifically looks for the execution of the VScode portable binary with the &ldquo;tunnel&rdquo; command-line option, which is indicative of an attempt to establish a remote tunnel session to either GitHub or a remote VScode instance. Successful exploitation can lead to command and control capabilities, allowing attackers to remotely manage and compromise the affected system. The rule aims to detect this suspicious behavior by monitoring process execution and command-line arguments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through unspecified means.</li>
<li>The attacker downloads a portable version of Visual Studio Code (VScode) onto the compromised system.</li>
<li>The attacker executes the VScode binary with the <code>tunnel</code> command-line argument to initiate a remote tunnel session.</li>
<li>The attacker specifies additional arguments such as <code>--accept-server-license-terms</code> to bypass license agreement prompts.</li>
<li>The VScode tunnel attempts to establish a connection to a remote server, potentially a GitHub repository or a remote VScode instance controlled by the attacker.</li>
<li>If successful, the tunnel creates a persistent connection, allowing the attacker to execute commands and transfer files.</li>
<li>The attacker uses the established tunnel to remotely access the compromised system, enabling them to perform malicious activities such as data exfiltration or lateral movement.</li>
<li>The attacker maintains persistent access through the established tunnel, allowing for long-term command and control of the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish a persistent command and control channel, enabling them to remotely manage the compromised system. This can lead to data theft, deployment of ransomware, or further lateral movement within the network. While the number of potential victims and specific sectors targeted are not explicitly stated, the widespread use of VScode makes a wide range of organizations vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Attempt to Establish VScode Remote Tunnel&rdquo; rule to detect suspicious VScode tunnel activity in your environment.</li>
<li>Enable Sysmon process-creation logging to capture the necessary process execution data.</li>
<li>Investigate any alerts triggered by the rule, focusing on the command-line arguments and process behaviors to confirm malicious intent.</li>
<li>Monitor network connections originating from VScode processes for unusual or unauthorized connections to external servers.</li>
<li>Review and whitelist legitimate uses of VScode&rsquo;s tunnel feature by authorized developers to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>vscode</category><category>remote-access-tools</category><category>windows</category></item></channel></rss>