Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Malware Discovered in 19 Visual Studio Code Extensions
News

Malware Discovered in 19 Visual Studio Code Extensions

Team-CWDBy Team-CWDDecember 12, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A campaign involving 19 Visual Studio (VS) Code extensions that embed malware inside their dependency folders has been uncovered by cybersecurity researchers.

Active since February 2025 but identified on December 2, the operation used a legitimate npm package to disguise harmful files and bundled malicious binaries inside an archive masquerading as a PNG image.

This approach, observed by ReversingLabs (RL), enabled attackers to bypass conventional checks and target developers directly.

Evolving Phishing Tactics

A new wave of malicious VS Code extensions has been circulating throughout 2025, with ReversingLabs noting a steady rise in suspicious uploads to the VS Code Marketplace.

Some extensions imitate popular tools, while others advertise new features but secretly execute unwanted code. Even trusted extensions can be compromised: in July, a malicious pull request contaminated a legitimate project simply by adding a harmful dependency.

In this new campaign, attackers embedded a modified version of the npm package path-is-absolute inside the extensions’ node_modules folders.

The original package is widely used, with more than 9 billion downloads since 2021, but the altered version included a class designed to trigger malware when VS Code starts. Its purpose was to decode a JavaScript dropper stored in a file named “lock.”

Read more on Visual Studio Code supply chain threats: Malicious VS Code Extensions Deploy Advanced Infostealer

The attackers also included a file named banner.png, which appeared harmless but opened as an archive containing two binaries.

The dropper launched these files via cmstp.exe, a common living-off-the-land binary (LOLBIN). One executable closed the process by simulating a keypress, while the other was a Rust-based Trojan still being analyzed at the time of this report.

A Growing Threat to Developers

ReversingLabs said while most malicious extensions relied on the modified path-is-absolute dependency, four others instead weaponized the npm package @actions/io, storing the payload across TypeScript and map files rather than using the disguised PNG.

Although the techniques differed, the goal remained the same: covertly execute malware through trusted components.

Detecting malicious VS Code extensions has become increasingly urgent, ReversingLabs warned. The firm said detections grew from 27 in 2024 to 105 in the first 10 months of 2025.

To reduce risk, teams are encouraged to:

  • Inspect extensions before installation

  • Audit all bundled dependencies

  • Use security tools capable of evaluating package behavior

“Staying safe isn’t about avoiding extensions altogether – it is about recognizing that even trusted components can be tampered with,” ReversingLabs said.

“All the mentioned extensions have been reported to Microsoft.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticlePicklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code
Next Article Turning Disruptive Technology into a Strategic Advantage
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Find your weak spots before attackers do

November 21, 2025

When ‘hacking’ your game becomes a security risk

October 17, 2025

2025’s most common passwords were as predictable as ever

January 21, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.