Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Malicious VS Code Extension Found

November 7, 2025
Reading Time: 3 mins read
in Alerts
Gootloader Returns With New Tricks

A malicious Visual Studio Code (VS Code) extension has been flagged by cybersecurity researchers due to its basic ransomware capabilities. The extension, which appears to have been created with the help of artificial intelligence—a practice dubbed “vibe-coding”—was identified shortly after its upload to the official marketplace. Secure Annex researcher John Tuckner, who initially discovered the threat, noted that the extension, named “susvsex,” made no attempts to hide its harmful functionality. It was uploaded on November 5, 2025, by a user named “suspublisher18” with a casual description, “Just testing,” and an obviously fake email address.

The extension’s listed description explicitly detailed its actions, stating it “Automatically zips, uploads, and encrypts files from C:\Users\Public\testing (Windows) or /tmp/testing (macOS) on first launch.” This highly concerning behavior prompted Microsoft to take swift action, and the extension was removed from the official VS Code Extension Marketplace on November 6. According to the developer’s shared details, the extension was designed to automatically activate itself upon any event, such as installation or the launch of VS Code.

Once activated, the extension invokes a function called “zipUploadAndEncrypt.” This function is responsible for creating a compressed ZIP archive of a specified target directory, uploading and exfiltrating this archive to a remote server, and then replacing the original files on the user’s machine with their encrypted versions. Fortunately, according to Tuckner, the TARGET_DIRECTORY was initially configured to a benign test staging directory. He noted that while this limited its immediate impact, the target directory could be easily updated in a subsequent extension release or via a command sent through its command-and-control (C2) channel.

Beyond the core encryption and exfiltration, the malicious extension also leverages GitHub for its command-and-control infrastructure. It operates by continuously polling a private GitHub repository to check for and execute any new commands. It achieves this by parsing the repository’s “index.html” file for instructions. After executing a command, the extension writes the results back to the same repository into a “requirements.txt” file, using a GitHub access token that was carelessly embedded within its code.

The associated GitHub account, “aykhanmv,” remains active, with the user claiming to be based in Baku, Azerbaijan. Tuckner highlighted several key indicators of the malware’s hasty, AI-assisted development, or “vibe-coded” nature. These signs included extraneous comments that detailed the functionality, README files with execution instructions, and placeholder variables. Critically, the extension package was found to have accidentally included vital components such as decryption tools, the command and control server code, and the GitHub access keys for the C2 server, which could potentially allow others to compromise or take over the C2 infrastructure.

Reference:

  • Vibe Coded Malicious VS Code Extension Found With Built In Ransomware Features
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

Gootloader Returns With New Tricks

CISA Warns Of CentOS Panel Exploit

November 7, 2025
Gootloader Returns With New Tricks

Gootloader Returns With New Tricks

November 7, 2025
Russia Group Exploits Windows HyperV

Russia Group Exploits Windows HyperV

November 6, 2025
Russia Group Exploits Windows HyperV

SkyCloak Backdoor Targets Defense Firms

November 6, 2025
Russia Group Exploits Windows HyperV

Teams Bugs Let Hackers Impersonate

November 6, 2025
Microsoft Edge Adds Scareware Sensor

Post SMTP Plugin Hijacks Admins

November 5, 2025

Latest Alerts

Malicious VS Code Extension Found

CISA Warns Of CentOS Panel Exploit

Gootloader Returns With New Tricks

Russia Group Exploits Windows HyperV

SkyCloak Backdoor Targets Defense Firms

Teams Bugs Let Hackers Impersonate

Subscribe to our newsletter

    Latest Incidents

    US Budget Office Hit By Cyberattack

    Hyundai AutoEver Reports Data Breach

    Clop Claims Washington Post Breach

    Hackers Steal Data From Swiss Bank

    Belgian Telecoms Hit By Cyberattack

    Sandworm Wipers Hit Ukraines Grain Hub

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial