Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware

Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play

The latest update for Mastodon prepares quote posts, Revamps Design app

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Malicious Pull Request Targets Over 6,000 Developers Target via Vulnerable Escode vs Code Extensions
Identity

Malicious Pull Request Targets Over 6,000 Developers Target via Vulnerable Escode vs Code Extensions

userBy userJuly 8, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Vulnerable escodes and code extensions

Cybersecurity researchers have flagged supply chain attacks targeting Microsoft Visual Studio Code (VS Code) extensions called Ethcode, which are installed just over 6,000 times.

The compromise occurred via a GitHub Pull request opened on June 17, 2025 by a user named Airez299.

First released by 7 Finny in 2022, Ethcode is a VS code extension used to deploy and run Solidity Smart Contract on Ethereum Virtual Machine (EVM)-based blockchains. EVM is a distributed calculation engine designed to run smart contracts on the Ethereum Network.

According to the supply chain security company, the GitHub project received its last non-malicious update on September 6, 2024. This changed when Airez299 opened a pull request with the message “codebase modernizing CodeBase using VIEM integration and testing framework.”

Users claimed they added a new testing framework with Mocha integration and contract testing capabilities, and made many changes, including removing old configurations and updating to the latest version of dependencies.

Cybersecurity

While that might seem like a useful update for a project that has been dormant for more than nine months, Reversinglabs said that some of the 43 commits and around 4,000 lines of changes compromised the entire extension, allowing the unknown threat actor behind the attack to sneak into two lines of code.

This involves adding npm dependencies in the form of “keythereum-utils” in the project’s package.json file, and importing them into a typeScript file linked to the VS code extension (“src/extension.ts”).

The JavaScript library currently removed from the NPM registry is known to be heavily obfuscated and contains code to download the unknown second stage payload. The package has been downloaded 495 times.

Multiple versions of “keythereum-utils” have been uploaded to npm by users named 0xlab (version 1.2.1), 0xlabss (version 1.2.2, 1.2.3, 1.2.4, 1.2.5, and 1.2.6). The NPM account no longer exists.

“After removing the Keythereum-utils code, we were able to easily see what the script would do. We created a hidden powershell that downloads and runs batch scripts from public file hosting services,” says security researcher Petar Kirhmajer.

The exact nature of the payload is unknown, but it is believed to be part of malware that can steal cryptocurrency assets or addiction to contracts developed by users of extensions.

Following responsible disclosure to Microsoft, the extension has been removed from the VS Code Extension Market. After the malicious dependencies were removed, the extension was then revived.

“The escode package is unpublished by Microsoft,” said 0MKARA, the tool’s project maintainer, in a pull request filed June 28th.

Ethcode is the latest example of a broader and escalating trend in software supply chain attacks. Attackers use public repositories such as Pypi and NPM to deliver malware directly to the developer environment.

“The Github account Airez299, which started the Ethcode Pull request, was created on the same day that the PR request was opened,” Reversinglabs said. “Therefore, the Airez299 account does not have any previous history or activities associated with it, which strongly indicates that this is a throwaway account created with the purpose of infecting this report.

According to data compiled by Sonatype, 16,279 open source malware were discovered in the second quarter of 2025, jumping 188% from the previous year. In comparison, 17,954 open source malware were discovered in the first quarter of 2025.

Of these, over 4,400 malicious packages are designed to harvest and remove sensitive information such as credentials and API tokens.

“Malware targeting data corruption has doubled in frequency, accounting for 3% of malicious packages. It’s over 400 unique instances,” Sonatype said. “These packages are intended to damage files, inject malicious code, and disrupt the jamming applications and infrastructure.”

The North Korea-related Lazarus group has been downloaded more than 30,000 times due to 107 malicious packages. Another set of packages above 90 npm has been associated with a Chinese threat cluster called Yeshen-Asia, to collect a list of system information and running processes since at least December 2024.

These numbers highlight the increasing sophistication of attacks targeting developer pipelines, and attackers are increasingly compromising supply chains on trust in the open source ecosystem.

“Each of which was published from a separate author account, each hosted only one malicious component, all communicated with the infrastructure behind the CloudFlare-secured Yeshen.asia domain,” the company said.

“While no new technologies have been observed in this second wave, the level of automation and infrastructure reuse reflects an intentional and enduring campaign focused on theft of qualifications and stripping of secrecy.”

The development comes as Socket has identified eight fake game-related extensions in the Mozilla Firefox Add-on Store that have a variety of malicious features, ranging from adware to Google Oauth token theft.

Cybersecurity

Specifically, some of these extensions are also known to redirect to gambling sites, provide fake apple virus alerts, and secretly route shopping sessions via affiliate tracking links to win committees.

All add-on names are published by threat actors with username “mre1903”.

Calsyncmaster VPN – Grab a Proxy – 5 Nights Free Gimegim with Freddie’s Little Alchemy 2 Bubble Spinner 1V1

“Browser extensions remain the preferred attack vector due to their trustworthy status, widespread permissions and the ability to run within the browser’s security context.” “The progression from simple redirect fraud to OAuth qualification theft shows how quickly these threats evolve and expand.”

“More concerning, redirect infrastructure can be easily reused for more intrusive behaviors such as comprehensive tracking, qualification harvesting, and malware distribution.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy this LA-based VC company was an early investor in Slate Auto
Next Article Phone (3) Reviews | TechCrunch
user
  • Website

Related Posts

Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware

July 8, 2025

Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play

July 8, 2025

Five ways identity-based attacks are violating retail

July 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers use leaked shelter tool licenses to spread Lumma Stealer and Sectoprat malware

Anatsa Android Banking Trojan hits 90,000 users with fake PDF apps on Google Play

The latest update for Mastodon prepares quote posts, Revamps Design app

Moonvalley’s “ethical” AI video model for filmmakers has been released

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.