Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Over 100 VS Code extensions expose developers to hidden supply chain risks
Identity

Over 100 VS Code extensions expose developers to hidden supply chain risks

userBy userOctober 15, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

VS Code extensions

A new study has found that more than 100 Visual Studio Code (VS Code) extension publishers have compromised access tokens that can be exploited by malicious actors to update their extensions, posing significant risks to the software supply chain.

“Leaked VSCode Marketplace or Open VSX PAT [personal access token] Wiz security researcher Rami McCarthy said in a report shared with The Hacker News: “An attacker could distribute updates to a malicious extension directly to the entire installed base. An attacker who discovered this issue would have been able to directly distribute malware to a cumulative installed base of 150,000.”

The cloud security firm noted that publishers often fail to account for the fact that although VS Code extensions are distributed as .vsix files, they may contain hard-coded secrets when unzipped and inspected.

In total, over 550 verified secrets were found, distributed across over 500 extensions from hundreds of different publishers, according to Wiz. The 550 secrets have been found to fall into 67 different types of secrets, including:

AI provider secrets (OpenAI, Gemini, Anthropic, XAI, DeepSeek, Hugging Face, Perplexity, etc.) Cloud service provider secrets (Amazon Web Services (AWS), Google Cloud, GitHub, Stripe, Auth0, etc.) Database secrets (MongoDB, PostgreSQL, Supabase, etc.)

Wiz also noted in the report that over 100 extensions had leaked VS Code Marketplace PATs, accounting for over 85,000 installs. We found an additional 30 extensions with a cumulative installed base of over 100,000 to open VSX access tokens. The majority of flagged extensions are themes.

DFIR retainer service

Because Open VSX is also integrated with artificial intelligence (AI)-powered forks of VS Code such as Cursor and Windsurf, extensions that leak access tokens can significantly expand the attack surface.

As an example, the company said it had identified a VS Code Marketplace PAT that could push targeted malware to employees of a giant $30 billion Chinese company, indicating that the issue also extends to internal and vendor-specific extensions used by organizations.

After making responsible disclosures to Microsoft in late March and April 2025, the Windows maker announced it was revoking the leaked PAT, blocking extensions with verified secrets, and adding a secret scanning feature that notifies developers if a secret is detected.

We recommend that VS Code users limit the number of extensions installed, vet extensions before downloading them, and weigh the pros and cons of enabling automatic updates. We recommend that organizations create an extension inventory and consider a central allowlist for extensions to better respond to reports of malicious extensions.

“This issue highlights the continuing risks of extensions and plugins, and supply chain security in general,” With said. “We continue to validate the impression that any package repository carries a high risk of mass security exposure.”

TigerJack targets VS Code marketplace with malicious extension

The development comes after Koi Security revealed details of a threat actor codenamed TigerJack who allegedly published at least 11 legitimate-looking malicious VS Code extensions using various publisher accounts since early 2025 as part of a “coordinated and systematic” campaign.

“Tigerjack, operating under the identities ab-498, 498, and 498-00, deployed a sophisticated arsenal of extensions that stole source code, mined cryptocurrencies, and established remote backdoors for complete system control,” said security researcher Tuval Admoni.

Two of the malicious extensions (C++ Playground and HTTP Format) garnered over 17,000 downloads before being removed. However, they are still available in Open VSX, and the threat actor republished the same malicious code under a new name on the VS Code Marketplace on September 17, 2025 after its removal.

The remarkable thing about these extensions is that they deliver the promised functionality, which provides full coverage so that unsuspecting developers who may have installed them are unaware of their malicious activities.

Specifically, the C++ Playground extension has been found to capture keystrokes in near real-time through a listener that is triggered after a 500ms delay. The ultimate goal is to steal C++ source code files. The HTTP Format extension, on the other hand, hides malicious code to run the CoinIMP miner and exploit system resources to secretly mine cryptocurrencies.

Three other extensions published by TigerJack under the alias ‘498’, namely cppplayground, httpformat and pythonformat, further increase the risk by incorporating functionality that acts as a backdoor by downloading and executing arbitrary JavaScript from external servers (‘ab498.pythananywhere’).[.]com”) every 20 minutes.

CIS build kit

“By checking for new instructions every 20 minutes and using eval() on remotely retrieved code, TigerJack can dynamically push malicious payloads without updating the extension. It can steal credentials or API keys, deploy ransomware, use compromised developer machines as entry points into corporate networks, inject backdoors into projects, and monitor activity in real time.” Admoni says Mr.

Koi Security also pointed out that most of these extensions started out as completely benign tools before any malicious changes were introduced, making them a classic example of a Trojan horse approach. This provides several benefits as it allows threat actors to establish legitimacy and gain attention among users.

Additionally, threat actors can push updates later and compromise the environment, potentially fooling developers who vetted the extension before installing it.

In June 2025, Microsoft announced that it was implementing a multi-step process to protect the VS Code marketplace from malware. This includes an initial scan of all incoming packages for malicious runtime behavior in a sandbox environment, as well as rescans and regular market-wide scans to “ensure everything is safe.”

That said, these security protections apply only to the VS Code Marketplace and not to others, such as the Open VSX Registry. This means that even if a malicious extension is removed from Microsoft’s platform, attackers can easily migrate to less secure alternatives.

“The fragmented security landscape across all markets has created dangerous blind spots that sophisticated attackers are already exploiting,” the company said. “When security operates in silos, threats simply move between platforms without developers even realizing it.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleVSCO expands AI editing capabilities and supports RAW files
Next Article You can now send text messages to Spotify’s AI DJs
user
  • Website

Related Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.