Threat Actors Weaponize Visual Studio Code to Deploy Multi-Stage Malware

Related

ApolloMD Data Breach Impacts More Than 620,000

What happened A cyberattack on the Georgia-based healthcare provider ApolloMD...

Atlas Air Ransomware Breach Allegedly Exposes Boeing Technical Data

What happened Attackers claiming affiliation with the Everest ransomware gang...

Threat Actors Leveraging Employee Monitoring and SimpleHelp Tools in Attacks

What happened Security researchers have documented threat actors abusing legitimate...

Palo Alto Networks Firewall Reboot Loop Flaw Affects Next-Generation Devices

What happened A software flaw in Palo Alto Networks next-generation...

Promptware Leveraged Google Calendar Invites in Credential Harvesting Campaign

What happened Security researchers from ReversingLabs have uncovered a malicious...

Share

What happened

Threat actors are exploiting Visual Studio Code extensions to deliver multi-stage malware. Trend Micro analysts identified malicious extensions that execute obfuscated PowerShell scripts and additional payloads once installed. The attack chain begins with a seemingly legitimate extension, which downloads secondary scripts, executes them silently, and establishes persistence. Malware stages include credential theft, lateral movement capabilities, and command-and-control communication. This vector leverages the trusted VS Code environment to bypass standard security controls, targeting developers and IT personnel directly.

Who is affected

Developers, IT teams, and organizations using Visual Studio Code for software development are directly exposed, particularly if extensions are installed from unverified sources.

Why CISOs should care

Using trusted development tools to deliver malware introduces high risk for intellectual property theft, credential compromise, and lateral movement within networks.

3 practical actions

  • Verify extension sources: Restrict installation to vetted extensions from trusted repositories.
  • Monitor developer environments: Detect abnormal script execution or external communications from VS Code processes.
  • Educate development teams: Ensure developers understand the risks of unverified extensions and insecure scripts.