Malicious VS Code Extensions Found Dropping Infostealers

Related

Apple and PayPal Invoice Emails Abused in Invoice-Themed Phishing Scams

What happened Threat actors are abusing legitimate-looking invoice emails referencing...

CISOs and Security Leaders to Watch in Belgian Retail & E‑commerce

In Belgium’s fast-evolving retail and e‑commerce sector, cybersecurity leadership...

FortiClient EMS RCE Vulnerability Enables Remote Code Execution

What happened A critical remote code execution vulnerability in FortiClient...

Telegram Phishing Attack Abuses Authentication Workflows to Harvest Credentials

What happened Researchers at Cyfirma have uncovered a phishing campaign...

Share

What happened

Researchers found several malicious Visual Studio Code extensions in Microsoft’s VS Code Marketplace. These extensions delivered infostealers that captured credentials, system data, and sensitive developer information.

Who is affected

Developers and organizations that installed the compromised extensions on Windows, macOS, or Linux systems are at risk.

Why CISOs should care

Code editors are widely used across engineering teams. A malicious extension can give attackers direct access to developer environments, internal repositories, and stored credentials. This expands the attack surface and creates a path for supply chain compromise.

3 practical actions

  1. Audit all VS Code extensions across developer endpoints and remove any unverified or suspicious plugins.
  2. Enforce policies that limit extension installation to approved and vetted sources.
  3. Monitor for unusual access patterns from developer machines, including credential theft indicators and unauthorized repository activity.