What's Happening?
Cybersecurity researchers have identified two malicious Visual Studio Code extensions, Bitcoin Black and Codo AI, that are capable of stealing sensitive information from users. These extensions, available on the VS Code marketplace, use a combination
of social engineering and technical disguise to deploy a DLL-based infostealer. The extensions were detailed in a report by Koi Security, which highlighted their ability to collect data such as clipboard contents, installed programs, running processes, desktop screenshots, stored WiFi credentials, and browser session data. The attackers used DLL hijacking techniques to disguise the malware as a legitimate process, allowing it to run undetected. The extensions were attributed to the same threat actor, who used different lures to target developers.
Why It's Important?
The discovery of these malicious extensions underscores the growing threat landscape for developers and the software supply chain. As developers increasingly rely on third-party tools and extensions, the risk of inadvertently installing malicious software rises. This incident highlights the need for enhanced security measures and vigilance in the software development community. The ability of these extensions to exfiltrate sensitive data poses significant risks to both individual developers and organizations, potentially leading to data breaches and compromised systems. The incident also emphasizes the importance of monitoring and securing developer tools to prevent exploitation by cybercriminals.
What's Next?
Developers and organizations are likely to increase scrutiny of third-party extensions and tools to mitigate similar threats in the future. Security teams may implement stricter policies and conduct regular audits of installed extensions to ensure they are safe. Additionally, platforms like the VS Code marketplace may enhance their vetting processes to detect and remove malicious extensions more effectively. The cybersecurity community will continue to monitor and analyze such threats to develop better defense mechanisms and raise awareness among developers about the risks associated with third-party tools.












