Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Malicious VSCode Extensions Steal Crypto

October 16, 2025
Reading Time: 3 mins read
in Alerts

A persistent threat actor, known as TigerJack, has been targeting developers with malicious extensions on both the Microsoft Visual Studio Code (VSCode) marketplace and the OpenVSX registry. These malicious extensions are designed to steal cryptocurrency and plant backdoors on developers’ systems. The malicious campaign, which has distributed at least 11 extensions this year, was uncovered by researchers at Koi Security. Two of the extensions, which had been downloaded over 17,000 times before being removed from the VSCode marketplace, are still available for download on OpenVSX, a community-maintained, open-source alternative. This is particularly concerning as OpenVSX is the default marketplace for several popular VSCode-compatible editors.

TigerJack has repeatedly republished the same malicious code under new names on the VSCode marketplace after the originals were removed. For example, two extensions previously named C++ Playground and HTTP Format were reintroduced through new accounts. The C++ Playground extension was designed to exfiltrate source code by capturing keystrokes in near real-time, sending the data to multiple external endpoints. Meanwhile, the HTTP Format extension, while appearing to work as advertised, secretly ran a CoinIMP crypto miner in the background, consuming the host’s entire processing power to mine cryptocurrency. The miner did not implement any restrictions on resource usage, leveraging the full computing power of the compromised machine.

Another category of TigerJack’s malicious extensions, including cppplayground, httpformat, and pythonformat, are far more menacing. These extensions fetch and execute JavaScript code from a hardcoded remote address. This allows the threat actor to execute arbitrary code on the host machine without having to update the extension. The researchers at Koi Security noted that this dynamic payload delivery system could be used for a wide range of malicious activities, including stealing credentials and API keys, deploying ransomware, and injecting backdoors into projects. These compromised developer machines could also serve as entry points into corporate networks.

Koi Security described TigerJack as a coordinated multi-account operation. The threat actor creates an illusion of independent, credible developers by building fake backgrounds with GitHub repositories, branding, detailed feature lists, and extension names that closely resemble those of legitimate tools. This deceptive strategy makes it difficult for developers to distinguish between legitimate and malicious extensions. This level of sophistication allows TigerJack to effectively bypass security measures and trick unsuspecting developers into downloading their harmful extensions.

Despite Koi Security reporting their findings to OpenVSX, there has been no response from the registry’s maintainers at the time of publication, and the two malicious extensions remain available for download. This highlights a significant security risk for developers who use the platform. Therefore, developers are strongly advised to exercise caution and only download packages from reputable and trustworthy publishers to mitigate the risk of falling victim to such campaigns. Taking a moment to verify the publisher’s identity and reputation can prevent a wide range of potential security breaches.

Reference:

  • Malicious Crypto Stealing VSCode Extensions Found Again On OpenVSX Registry
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

Fortinet And Ivanti Patch Severe Flaws

October 16, 2025

Fake Password Manager Hijack PCs

October 16, 2025
Android Flaw Lets Apps Steal 2FA Codes

Android Flaw Lets Apps Steal 2FA Codes

October 15, 2025
Android Flaw Lets Apps Steal 2FA Codes

New Sap Netweaver Bug Enables Takeover

October 15, 2025
Two New Windows Zero Days Exploited

Two New Windows Zero Days Exploited

October 15, 2025
Oracle Issues Urgent E Business Suite Fix

Google And Mandiant Uncover Oracle Hack

October 14, 2025

Latest Alerts

Fortinet And Ivanti Patch Severe Flaws

Malicious VSCode Extensions Steal Crypto

Fake Password Manager Hijack PCs

Android Flaw Lets Apps Steal 2FA Codes

New Sap Netweaver Bug Enables Takeover

Two New Windows Zero Days Exploited

Subscribe to our newsletter

    Latest Incidents

    F5 Reports Hackers Stole Source Code

    YouTube Down Globally With Playback Errors

    Spanish Retailer Mango Discloses Breach

    Unencrypted Satellites Expose Data

    Sonicwall VPN Accounts Breached

    Microsoft Investigates 365 App Outage

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial