Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Malicious VSCode Extensions Steal Crypto

October 16, 2025
Reading Time: 3 mins read
in Alerts

A persistent threat actor, known as TigerJack, has been targeting developers with malicious extensions on both the Microsoft Visual Studio Code (VSCode) marketplace and the OpenVSX registry. These malicious extensions are designed to steal cryptocurrency and plant backdoors on developers’ systems. The malicious campaign, which has distributed at least 11 extensions this year, was uncovered by researchers at Koi Security. Two of the extensions, which had been downloaded over 17,000 times before being removed from the VSCode marketplace, are still available for download on OpenVSX, a community-maintained, open-source alternative. This is particularly concerning as OpenVSX is the default marketplace for several popular VSCode-compatible editors.

TigerJack has repeatedly republished the same malicious code under new names on the VSCode marketplace after the originals were removed. For example, two extensions previously named C++ Playground and HTTP Format were reintroduced through new accounts. The C++ Playground extension was designed to exfiltrate source code by capturing keystrokes in near real-time, sending the data to multiple external endpoints. Meanwhile, the HTTP Format extension, while appearing to work as advertised, secretly ran a CoinIMP crypto miner in the background, consuming the host’s entire processing power to mine cryptocurrency. The miner did not implement any restrictions on resource usage, leveraging the full computing power of the compromised machine.

Another category of TigerJack’s malicious extensions, including cppplayground, httpformat, and pythonformat, are far more menacing. These extensions fetch and execute JavaScript code from a hardcoded remote address. This allows the threat actor to execute arbitrary code on the host machine without having to update the extension. The researchers at Koi Security noted that this dynamic payload delivery system could be used for a wide range of malicious activities, including stealing credentials and API keys, deploying ransomware, and injecting backdoors into projects. These compromised developer machines could also serve as entry points into corporate networks.

Koi Security described TigerJack as a coordinated multi-account operation. The threat actor creates an illusion of independent, credible developers by building fake backgrounds with GitHub repositories, branding, detailed feature lists, and extension names that closely resemble those of legitimate tools. This deceptive strategy makes it difficult for developers to distinguish between legitimate and malicious extensions. This level of sophistication allows TigerJack to effectively bypass security measures and trick unsuspecting developers into downloading their harmful extensions.

Despite Koi Security reporting their findings to OpenVSX, there has been no response from the registry’s maintainers at the time of publication, and the two malicious extensions remain available for download. This highlights a significant security risk for developers who use the platform. Therefore, developers are strongly advised to exercise caution and only download packages from reputable and trustworthy publishers to mitigate the risk of falling victim to such campaigns. Taking a moment to verify the publisher’s identity and reputation can prevent a wide range of potential security breaches.

Reference:

  • Malicious Crypto Stealing VSCode Extensions Found Again On OpenVSX Registry
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

ShadowPad Exploits WSUS Flaw For Access

Windows 11 24H2 Explorer And Start Crash

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

Matrix Push C2 Uses Browser Alerts To Phish

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

ShadowPad Exploits WSUS Flaw For Access

November 24, 2025
Salesforce Breach Hits Over 200 Victims

Sturnus Trojan Steals Android Chats

November 21, 2025
Salesforce Breach Hits Over 200 Victims

Tsundere Botnet Grows via Game Lures

November 21, 2025
APT24 Uses BADAUDIO in Taiwan Spying

APT24 Uses BADAUDIO in Taiwan Spying

November 21, 2025

Latest Alerts

Windows 11 24H2 Explorer And Start Crash

Matrix Push C2 Uses Browser Alerts To Phish

ShadowPad Exploits WSUS Flaw For Access

Sturnus Trojan Steals Android Chats

Tsundere Botnet Grows via Game Lures

APT24 Uses BADAUDIO in Taiwan Spying

Subscribe to our newsletter

    Latest Incidents

    Delta Dental Virginia Breach Hits 146000

    Iberia Alerts Customers To Data Breach

    Cox Confirms Oracle Hack As Victims Named

    Over 50000 Asus Routers Compromised

    Salesforce Breach Hits Over 200 Victims

    Almaviva Leak Exposes FS Group Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial