Hackers Weaponized Open VSX Extension With Sophisticated Malware

Related

BlackIce Red Teaming Toolkit Released for AI Security Testing

What happened Databricks introduced BlackIce, a containerized toolkit designed to...

FortiCloud SSO Authentication Bypass Exploited

What happened An authentication bypass vulnerability affecting FortiCloud Single Sign-On...

31.4 Tbps DDoS Attack Sets New Record

What happened A distributed denial-of-service campaign reached a peak traffic...

Matanbuchus Malware Downloader Evading AV Detection

What happened The Matanbuchus malware downloader has reappeared with updated...

Australia’s Healthcare Cybersecurity Leaders to Watch

The Australian healthcare sector has never faced more scrutiny...

Share

What happened

A malicious software extension distributed through the Open VSX marketplace was used to deliver malware to thousands of developer systems, according to Annex analysts. The extension impersonated an Angular Language Service package while embedding encrypted malware alongside legitimate components. When triggered, the payload decrypted itself and connected to command-and-control infrastructure hosted via the Solana blockchain. The extension remained available for approximately two weeks before being identified and removed.

Who is affected

Developers who installed the compromised extension from Open VSX are affected, particularly those who opened HTML or TypeScript files after installation.

Why CISOs should care

Compromised development tooling introduces software supply chain risk and can lead to malware execution on developer endpoints.

3 practical actions

  • Audit installed Open VSX extensions. Identify and remove the malicious package.
  • Investigate affected workstations. Review developer systems for signs of malware execution.
  • Review extension sourcing controls. Assess how development tools are approved and distributed.