× EU ICT Risk Newsroom DORA News On the Horizon ΑΙ Cybersec Space Cyber Alerts GDPR News EU CERT Advisories ICT Governance ESA/NCAs Contact

Malicious VSCode extensions hid trojan in fake PNG files

A stealthy campaign involving 19 extensions on the VSCode Marketplace has been active since February. It specifically targets developers, embedding malware within dependency folders. These malicious extensions masqueraded as legitimate tools, successfully tricking unsuspecting developers into downloading them.

Malicious VSCode extensions hid trojan in fake PNG files
A stealthy campaign involving 19 extensions on the VSCode Marketplace has been active since February. It specifically targets developers, embedding malware within dependency folders. These malicious extensions masqueraded as legitimate tools, successfully tricking unsuspecting developers into downloading them. This sophisticated method made detection difficult for standard security protocols, posing a significant threat to the developer community. Once installed, the trojan would exfiltrate sensitive data or inject further malicious code into their projects. The attackers cleverly disguised the malware within seemingly innocuous files, often using fake PNG images as a cover. This campaign highlights the ongoing risks associated with third-party software marketplaces. It underscores the critical need for vigilant security practices among developers. Users are strongly advised to verify the authenticity of extensions before installation. They should also regularly audit their development environments for any suspicious activity. The discovery of this campaign has prompted a swift response from Microsoft. The company has already begun removing the identified malicious extensions from its marketplace to protect its user base.

Subscribe for EU DORA and Banking ICT Risk news and insights