Malicious VS Code Extensions Found Dropping Infostealers

Related

Cybersecurity Leaders to Watch in Washington’s Higher Education Industry

Washington's higher education sector depends on cybersecurity leaders who...

Cybersecurity Leaders to Watch in Washington’s Healthcare Industry

Washington’s healthcare sector depends on cybersecurity leaders who can...

Cybersecurity Leaders to Watch in Washington’s Defense & Aerospace Industry

Washington’s defense and aerospace ecosystem depends on cybersecurity leaders...

Cybersecurity Leaders to Watch in Washington’s Information Technology Industry

Washington’s information technology sector includes enterprise software, cloud infrastructure,...

Share

What happened

Researchers found several malicious Visual Studio Code extensions in Microsoft’s VS Code Marketplace. These extensions delivered infostealers that captured credentials, system data, and sensitive developer information.

Who is affected

Developers and organizations that installed the compromised extensions on Windows, macOS, or Linux systems are at risk.

Why CISOs should care

Code editors are widely used across engineering teams. A malicious extension can give attackers direct access to developer environments, internal repositories, and stored credentials. This expands the attack surface and creates a path for supply chain compromise.

3 practical actions

  1. Audit all VS Code extensions across developer endpoints and remove any unverified or suspicious plugins.
  2. Enforce policies that limit extension installation to approved and vetted sources.
  3. Monitor for unusual access patterns from developer machines, including credential theft indicators and unauthorized repository activity.