Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Malicious VSCode Extensions Steal Crypto

October 16, 2025
Reading Time: 3 mins read
in Alerts

A persistent threat actor, known as TigerJack, has been targeting developers with malicious extensions on both the Microsoft Visual Studio Code (VSCode) marketplace and the OpenVSX registry. These malicious extensions are designed to steal cryptocurrency and plant backdoors on developers’ systems. The malicious campaign, which has distributed at least 11 extensions this year, was uncovered by researchers at Koi Security. Two of the extensions, which had been downloaded over 17,000 times before being removed from the VSCode marketplace, are still available for download on OpenVSX, a community-maintained, open-source alternative. This is particularly concerning as OpenVSX is the default marketplace for several popular VSCode-compatible editors.

TigerJack has repeatedly republished the same malicious code under new names on the VSCode marketplace after the originals were removed. For example, two extensions previously named C++ Playground and HTTP Format were reintroduced through new accounts. The C++ Playground extension was designed to exfiltrate source code by capturing keystrokes in near real-time, sending the data to multiple external endpoints. Meanwhile, the HTTP Format extension, while appearing to work as advertised, secretly ran a CoinIMP crypto miner in the background, consuming the host’s entire processing power to mine cryptocurrency. The miner did not implement any restrictions on resource usage, leveraging the full computing power of the compromised machine.

Another category of TigerJack’s malicious extensions, including cppplayground, httpformat, and pythonformat, are far more menacing. These extensions fetch and execute JavaScript code from a hardcoded remote address. This allows the threat actor to execute arbitrary code on the host machine without having to update the extension. The researchers at Koi Security noted that this dynamic payload delivery system could be used for a wide range of malicious activities, including stealing credentials and API keys, deploying ransomware, and injecting backdoors into projects. These compromised developer machines could also serve as entry points into corporate networks.

Koi Security described TigerJack as a coordinated multi-account operation. The threat actor creates an illusion of independent, credible developers by building fake backgrounds with GitHub repositories, branding, detailed feature lists, and extension names that closely resemble those of legitimate tools. This deceptive strategy makes it difficult for developers to distinguish between legitimate and malicious extensions. This level of sophistication allows TigerJack to effectively bypass security measures and trick unsuspecting developers into downloading their harmful extensions.

Despite Koi Security reporting their findings to OpenVSX, there has been no response from the registry’s maintainers at the time of publication, and the two malicious extensions remain available for download. This highlights a significant security risk for developers who use the platform. Therefore, developers are strongly advised to exercise caution and only download packages from reputable and trustworthy publishers to mitigate the risk of falling victim to such campaigns. Taking a moment to verify the publisher’s identity and reputation can prevent a wide range of potential security breaches.

Reference:

  • Malicious Crypto Stealing VSCode Extensions Found Again On OpenVSX Registry
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

WinRAR Flaw Under Active Attack Now

Urgent Patches Issued For Major Flaws

December 10, 2025
WinRAR Flaw Under Active Attack Now

Microsoft Fixes Dozens Of Security Flaws

December 10, 2025
WinRAR Flaw Under Active Attack Now

WinRAR Flaw Under Active Attack Now

December 10, 2025
Android Malware Adds Stronger Data Theft

Sneeit RCE And ICTBroadcast Bug Power Attacks

December 8, 2025

MuddyWater Uses UDPGangster In Campaign

December 8, 2025
Android Malware Adds Stronger Data Theft

Android Malware Adds Stronger Data Theft

December 8, 2025

Latest Alerts

Urgent Patches Issued For Major Flaws

Microsoft Fixes Dozens Of Security Flaws

WinRAR Flaw Under Active Attack Now

Sneeit RCE And ICTBroadcast Bug Power Attacks

MuddyWater Uses UDPGangster In Campaign

Android Malware Adds Stronger Data Theft

Subscribe to our newsletter

    Latest Incidents

    Inotiv Reports Ransomware Data Breach

    Cyberattack Hits Leavenworth Services

    Cyber Outage Hits PES Energize Phones

    Honduran Vote System Faces Security Breach

    Petco Confirms Data Exposure Incident

    Hackers Hit Major Russian Logistics Firm

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial