Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories

December 13, 2025

5 Threats That Reshaped Web Security This Year [2025]

December 13, 2025

GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

December 13, 2025
Facebook X (Twitter) Instagram
Saturday, December 13
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Malware Discovered in 19 Visual Studio Code Extensions
News

Malware Discovered in 19 Visual Studio Code Extensions

Team-CWDBy Team-CWDDecember 12, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A campaign involving 19 Visual Studio (VS) Code extensions that embed malware inside their dependency folders has been uncovered by cybersecurity researchers.

Active since February 2025 but identified on December 2, the operation used a legitimate npm package to disguise harmful files and bundled malicious binaries inside an archive masquerading as a PNG image.

This approach, observed by ReversingLabs (RL), enabled attackers to bypass conventional checks and target developers directly.

Evolving Phishing Tactics

A new wave of malicious VS Code extensions has been circulating throughout 2025, with ReversingLabs noting a steady rise in suspicious uploads to the VS Code Marketplace.

Some extensions imitate popular tools, while others advertise new features but secretly execute unwanted code. Even trusted extensions can be compromised: in July, a malicious pull request contaminated a legitimate project simply by adding a harmful dependency.

In this new campaign, attackers embedded a modified version of the npm package path-is-absolute inside the extensions’ node_modules folders.

The original package is widely used, with more than 9 billion downloads since 2021, but the altered version included a class designed to trigger malware when VS Code starts. Its purpose was to decode a JavaScript dropper stored in a file named “lock.”

Read more on Visual Studio Code supply chain threats: Malicious VS Code Extensions Deploy Advanced Infostealer

The attackers also included a file named banner.png, which appeared harmless but opened as an archive containing two binaries.

The dropper launched these files via cmstp.exe, a common living-off-the-land binary (LOLBIN). One executable closed the process by simulating a keypress, while the other was a Rust-based Trojan still being analyzed at the time of this report.

A Growing Threat to Developers

ReversingLabs said while most malicious extensions relied on the modified path-is-absolute dependency, four others instead weaponized the npm package @actions/io, storing the payload across TypeScript and map files rather than using the disguised PNG.

Although the techniques differed, the goal remained the same: covertly execute malware through trusted components.

Detecting malicious VS Code extensions has become increasingly urgent, ReversingLabs warned. The firm said detections grew from 27 in 2024 to 105 in the first 10 months of 2025.

To reduce risk, teams are encouraged to:

  • Inspect extensions before installation

  • Audit all bundled dependencies

  • Use security tools capable of evaluating package behavior

“Staying safe isn’t about avoiding extensions altogether – it is about recognizing that even trusted components can be tampered with,” ReversingLabs said.

“All the mentioned extensions have been reported to Microsoft.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticlePicklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code
Next Article Turning Disruptive Technology into a Strategic Advantage
Team-CWD
  • Website

Related Posts

News

Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories

December 13, 2025
News

5 Threats That Reshaped Web Security This Year [2025]

December 13, 2025
News

GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

December 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Look out for phony verification pages spreading malware

September 14, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

What is it, and how do I get it off my device?

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.