Recent findings have unveiled a coordinated supply chain attack targeting the Visual Studio Code (VSCode) ecosystem through malicious extensions. At least a dozen plugins were found, some still operational, designed to infiltrate developer environments and facilitate large-scale data exfiltration and credential theft. This attack highlights the vulnerabilities in software supply chains that are being exploited due to the increasing reliance on IDE plugins and AI-powered tools.
These malicious extensions operate by gaining extensive access once installed, allowing them to discreetly extract project code, sensitive information, and even clipboard contents. Specific plugins, such as Christine-devops1234.scraper and Kodease.fyp-23-s2-08, were noted for employing various exfiltration techniques that range from basic HTTP POST requests to establishing persistent connections, thereby acting as covert backdoors within trusted environments. HelixGuard researchers first identified the coordinated nature of this scheme, revealing that some variants were capable of monitoring files and environment variables actively. The sophistication of this campaign underscores the critical need for vigilant plugin vetting and continuous marketplace monitoring.
👉 Pročitaj original: Cyber Security News