Florida Times

Florida: Driving America's New Greatness.
Thursday, Dec 11, 2025

Hackers Are Hiding Malware in Open-Source Tools and IDE Extensions

The common belief that “open source is safe because everyone can inspect the code” is misleading. In reality, most open-source projects include add-ons and components that are not open source at all — and these hidden parts can easily contain spyware, malware, and viruses. Once installed, they can take over both the user’s computer and the servers running the so-called open-source code, giving hackers full control to do whatever they want.

A newly uncovered cyberattack—one of the most sophisticated developer-focused campaigns seen in recent years—is weaponizing the daily workflow of software engineers. 

Security companies have revealed a malicious operation in which attackers insert stealthy malware into seemingly harmless extensions and open-source tools used by tens of thousands of developers worldwide. 

These extensions appear completely legitimate, yet silently exfiltrate highly sensitive data such as passwords, Wi-Fi access credentials, authentication tokens, clipboard contents, and even live screenshots taken directly from developers’ machines.


Compromised VS Code Extensions: “Bitcoin Black” and “Codo AI”

Two Visual Studio Code extensions were confirmed to contain embedded malicious components: the Bitcoin Black theme and an AI assistant tool called Codo AI. Both extensions looked fully legitimate on the marketplace and performed their advertised functions, which helped them evade suspicion and achieve wide adoption.

Once installed, the extensions deployed an additional malicious payload that continuously harvested data from infected devices. The threat actors were not content with collecting passwords alone. The malware captured real-time screenshots of developers’ screens—revealing source code, Slack discussions, credentials, internal documentation, and confidential project directories.

This level of visibility allows attackers to map entire workflows, understand sensitive architectures, and target organizations with precision.


The Attack Technique: DLL Hijacking as a Delivery Vehicle

The operation relied on an advanced method known as DLL hijacking, which abuses the way legitimate software loads system libraries.

The attackers downloaded a real, benign screenshot tool (Lightshot) onto the victim’s machine, pairing it with a malicious DLL that carried the same filename as the tool’s expected library. When Lightshot launched, it automatically loaded the attacker’s counterfeit DLL. This triggered the malware’s execution without raising suspicion.

Security researchers found that the malware collected:

  • Continuous screenshots and clipboard data

  • Wi-Fi passwords and saved wireless credentials

  • Browser cookies, authentication tokens, and active sessions (via Chrome and Edge in headless mode)

  • Information about installed software, running processes, and development tools

Koi Security reports that the attackers have been iterating and improving the operation, increasingly using “clean” and innocuous-looking scripts to blend in with normal developer activity.


The Campaign Is Spreading Beyond VS Code

While the first findings emerged in VS Code, similar malicious injections are now appearing across the broader open-source ecosystem:

  • npm and Go: Malware packages imitating the names of popular, trusted libraries

  • Rust: A library called finch-rust masqueraded as a scientific computation tool, but instead loaded an additional malware component called sha-rust

This reflects a direct attack on the software supply chain—the trust mechanism developers rely on when importing packages, extensions, or dependencies. By compromising tools that sit at the heart of software development, attackers gain privileged access to entire organizations.


Why This Threat Is So Dangerous

A single developer installing one benign-looking extension can unknowingly trigger a breach across the entire company:

  • Theft of core, proprietary source code

  • Takeover of GitHub and other cloud development accounts

  • Infection of CI/CD pipelines and build environments

  • Exposure of sensitive customer data, credentials, and internal architecture

Because development environments are privileged by design—holding secrets, tokens, SSH keys, and code—the blast radius of compromise is enormous.

Traditional static code scanning is insufficient for detecting these attacks. The extensions themselves often appear legitimate or include harmless code alongside hidden payloads. What is required is real-time behavioral monitoringcapable of flagging anomalous actions—such as a theme extension attempting to access stored passwords.


Recommended Security Measures for Developers and Organizations

To reduce exposure, cybersecurity firms recommend the following defensive steps:

  1. Enable multi-factor authentication on all development accounts, including GitHub, GitLab, cloud providers, and CI/CD tools.

  2. Verify the identity and reputation of extension publishers before installation.

  3. Avoid anonymous, poorly reviewed, or unknown plugins—even if they appear harmless.

  4. Adopt security tools that include behavioral detection, not only static scanning.

  5. Treat all AI-powered development tools with caution, especially those requesting elevated system permissions.

  6. Conduct regular audits of development environments, including browser sessions, secrets, stored tokens, and installed extensions.


This attack marks a turning point in developer-focused cybercrime. 

By targeting the very tools that developers rely on daily, attackers gain unprecedented access to the global software ecosystem. The findings underscore the urgent need for stronger supply-chain security, rigorous extension vetting, and behavioral monitoring to defend the world’s most sensitive development workflows.

AI Disclaimer: An advanced artificial intelligence (AI) system generated the content of this page on its own. This innovative technology conducts extensive research from a variety of reliable sources, performs rigorous fact-checking and verification, cleans up and balances biased or manipulated content, and presents a minimal factual summary that is just enough yet essential for you to function as an informed and educated citizen. Please keep in mind, however, that this system is an evolving technology, and as a result, the article may contain accidental inaccuracies or errors. We urge you to help us improve our site by reporting any inaccuracies you find using the "Contact Us" link at the bottom of this page. Your helpful feedback helps us improve our system and deliver more precise content. When you find an article of interest here, please look for the full and extensive coverage of this topic in traditional news sources, as they are written by professional journalists that we try to support, not replace. We appreciate your understanding and assistance.
Newsletter

Related Articles

0:00
0:00
Close
Hackers Are Hiding Malware in Open-Source Tools and IDE Extensions
Traveling to USA? Homeland Security moving toward requiring foreign travelers to share social media history
US, UK and Australia Defence Chiefs Convene in Washington to Relaunch AUKUS Commitments
What the White House’s Chip-Export Reversal Means for Nvidia
White House Adviser Hassett Says There Is “Plenty of Room” for Further Fed Rate Cuts
Trump Launches ‘Lower Prices, Bigger Paychecks’ Tour with Tariff-Centric Speech in Pennsylvania
New Photos Reveal Complete Demolition of White House East Wing as Trump’s Ballroom Project Advances
Some Republican Lawmakers Push Back as Trump Signals Possible Ground Action in Venezuela
United States Urges Immediate Halt to Fighting Between Thailand and Cambodia Amid Rising Casualties
Trump Announces He Will Phone Leaders in Bid to End Renewed Thailand–Cambodia Border War
UK Officials Push Back at Trump Saying European Leaders ‘Talk Too Much’ About Ukraine
Trump in Direct Assault: European Leaders Are Weak, Immigration a Disaster. Russia Is Strong and Big — and Will Win
Trump’s Interest in Australia’s Retirement Model Sparks Debate Over Its Fit for the United States
U.S. and Australia Advance Broad Military and Industrial Cooperation at 40th AUSMIN
Mark Zuckerberg Pulls Back From Metaverse After $70 Billion Loss as Meta Shifts Priorities to AI
Nvidia CEO Says U.S. Data-Center Builds Take Years while China ‘Builds a Hospital in a Weekend’
Hollywood Industry on Edge as Netflix Secures Near-$60 Bln Loan for Warner Bros Takeover
Trump Meets Mexico’s Claudia Sheinbaum for First Time at 2026 World Cup Draw
White House ‘Merch Room’ Draws Global Attention After Zelensky Seen in “4 More Years” Cap
Trump Taps Veteran D.C. Architect Shalom Baranes for Contested White House Ballroom Project
Hollywood megadeal: Netflix acquires Warner Bros. Discovery for 83 billion dollars
Two and a Half Weeks After the Major Outage: A Cloudflare Malfunction Brings Down Multiple Sites
Trump’s 2025 Security Blueprint Lambasts Europe, Reasserts U.S. Dominance in Americas
White House Strategy Warns Europe Could Be ‘Unrecognizable’ in Two Decades Amid Migration and EU Policies
U.S.–Saudi Rethink Deepens — Washington Moves Ahead Without Linking Riyadh to Israel Normalisation
Trump Administration Eyes Adopting Australian-Style Retirement System in US
Trump Hosts Congo and Rwanda Leaders for Peace and Minerals Pact at White House
Amazon Prepares to Expand Its Delivery Network as Talks with U.S. Postal Service Stall
Appeals Court Pauses Order to Remove National Guard — Trump Administration Can Keep Troops in Washington, D.C. for Now
Why Washington, D.C. Was Excluded as a 2026 World Cup Host Site
Trump Eyes Australia’s “Super” Pension Model as U.S. Weighs Retirement Reform
Majority in Australia, Japan and India See Trump Presidency as Harmful — New Poll Finds
White House Launches ‘Trump Accounts’ for Children Backed by $6.25 Billion Dell Family Donation
Melania Trump Unveils 2025 White House Christmas Theme ‘Home Is Where the Heart Is’ with Patriotic Cheer and Personal Touches
Questions Swirl After Bank of America CEO Absent from High-Profile White House Dinner
Melania Trump Ushers in Holiday Season with 2025 White House Christmas Tree
Trump: National Guard Soldier Who Was Shot in Washington Has Died; Second Soldier Fighting for His Life
"I Would Have Given Her a Kidney": She Lent Bezos’s Ex-Wife $1,000 — and Received Millions in Return
Joe and Hunter Biden Step Out Together in Nantucket — First Public Sighting Since Leaving the White House
Trump-McCrery Dispute Exposes Rift Over Gigantic New White House Ballroom Plan
Trump Seeks Additional 500 National Guard Troops for Washington After Ambush Near White House
Two National Guard Soldiers Shot Near White House; Afghan-Born Suspect in Custody, Trump Labels It Terror
Tensions Surface in Trump-MBS Talks as Saudi Pushes Back on Israel Normalisation
COP30 Ends Without Fossil Fuel Phase-Out as US, Saudi Arabia and Russia Align in Obstruction Role
NYC Mayor-Elect Zohran Mamdani Reveals Unusual Book He Spotted at White House
Melania Trump Welcomes White House Christmas Tree in Festive Holiday Tradition
Federal Judge Dismisses Cases Against Comey and James Over Illegal Prosecutor Appointment
Trump Hosts Saudi Crown Prince for Major Defence and Investment Agreements
Wealthy New Yorkers Weigh Second Homes as the ‘Mamdani Effect’ Ripples Through Luxury Markets
Families Accuse OpenAI of Enabling ‘AI-Driven Delusions’ After Multiple Suicides
×