Siem Reap Times

Tuesday, Mar 03, 2026

Hackers Are Hiding Malware in Open-Source Tools and IDE Extensions

The common belief that “open source is safe because everyone can inspect the code” is misleading. In reality, most open-source projects include add-ons and components that are not open source at all — and these hidden parts can easily contain spyware, malware, and viruses. Once installed, they can take over both the user’s computer and the servers running the so-called open-source code, giving hackers full control to do whatever they want.

A newly uncovered cyberattack—one of the most sophisticated developer-focused campaigns seen in recent years—is weaponizing the daily workflow of software engineers. 

Security companies have revealed a malicious operation in which attackers insert stealthy malware into seemingly harmless extensions and open-source tools used by tens of thousands of developers worldwide. 

These extensions appear completely legitimate, yet silently exfiltrate highly sensitive data such as passwords, Wi-Fi access credentials, authentication tokens, clipboard contents, and even live screenshots taken directly from developers’ machines.


Compromised VS Code Extensions: “Bitcoin Black” and “Codo AI”

Two Visual Studio Code extensions were confirmed to contain embedded malicious components: the Bitcoin Black theme and an AI assistant tool called Codo AI. Both extensions looked fully legitimate on the marketplace and performed their advertised functions, which helped them evade suspicion and achieve wide adoption.

Once installed, the extensions deployed an additional malicious payload that continuously harvested data from infected devices. The threat actors were not content with collecting passwords alone. The malware captured real-time screenshots of developers’ screens—revealing source code, Slack discussions, credentials, internal documentation, and confidential project directories.

This level of visibility allows attackers to map entire workflows, understand sensitive architectures, and target organizations with precision.


The Attack Technique: DLL Hijacking as a Delivery Vehicle

The operation relied on an advanced method known as DLL hijacking, which abuses the way legitimate software loads system libraries.

The attackers downloaded a real, benign screenshot tool (Lightshot) onto the victim’s machine, pairing it with a malicious DLL that carried the same filename as the tool’s expected library. When Lightshot launched, it automatically loaded the attacker’s counterfeit DLL. This triggered the malware’s execution without raising suspicion.

Security researchers found that the malware collected:

  • Continuous screenshots and clipboard data

  • Wi-Fi passwords and saved wireless credentials

  • Browser cookies, authentication tokens, and active sessions (via Chrome and Edge in headless mode)

  • Information about installed software, running processes, and development tools

Koi Security reports that the attackers have been iterating and improving the operation, increasingly using “clean” and innocuous-looking scripts to blend in with normal developer activity.


The Campaign Is Spreading Beyond VS Code

While the first findings emerged in VS Code, similar malicious injections are now appearing across the broader open-source ecosystem:

  • npm and Go: Malware packages imitating the names of popular, trusted libraries

  • Rust: A library called finch-rust masqueraded as a scientific computation tool, but instead loaded an additional malware component called sha-rust

This reflects a direct attack on the software supply chain—the trust mechanism developers rely on when importing packages, extensions, or dependencies. By compromising tools that sit at the heart of software development, attackers gain privileged access to entire organizations.


Why This Threat Is So Dangerous

A single developer installing one benign-looking extension can unknowingly trigger a breach across the entire company:

  • Theft of core, proprietary source code

  • Takeover of GitHub and other cloud development accounts

  • Infection of CI/CD pipelines and build environments

  • Exposure of sensitive customer data, credentials, and internal architecture

Because development environments are privileged by design—holding secrets, tokens, SSH keys, and code—the blast radius of compromise is enormous.

Traditional static code scanning is insufficient for detecting these attacks. The extensions themselves often appear legitimate or include harmless code alongside hidden payloads. What is required is real-time behavioral monitoringcapable of flagging anomalous actions—such as a theme extension attempting to access stored passwords.


Recommended Security Measures for Developers and Organizations

To reduce exposure, cybersecurity firms recommend the following defensive steps:

  1. Enable multi-factor authentication on all development accounts, including GitHub, GitLab, cloud providers, and CI/CD tools.

  2. Verify the identity and reputation of extension publishers before installation.

  3. Avoid anonymous, poorly reviewed, or unknown plugins—even if they appear harmless.

  4. Adopt security tools that include behavioral detection, not only static scanning.

  5. Treat all AI-powered development tools with caution, especially those requesting elevated system permissions.

  6. Conduct regular audits of development environments, including browser sessions, secrets, stored tokens, and installed extensions.


This attack marks a turning point in developer-focused cybercrime. 

By targeting the very tools that developers rely on daily, attackers gain unprecedented access to the global software ecosystem. The findings underscore the urgent need for stronger supply-chain security, rigorous extension vetting, and behavioral monitoring to defend the world’s most sensitive development workflows.

Newsletter

Related Articles

Siem Reap Times
0:00
0:00
Close
U.S. and Israel Intensify Strikes on Iran as Conflict Expands to Lebanon and Gulf States
When the State Replaces the Parent: How Gender Policy Is Redefining Custody and Coercion
Larry Summers, the former U.S. Treasury Secretary, is resigning from Harvard University as fallout continues over his ties to Jeffrey Epstein.
U.S. stocks ended higher on Wednesday, with the Dow gaining about six-tenths of a percent, the S&P 500 adding eight-tenths of a percent, and the tech-heavy Nasdaq climbing roughly one-and-a-quarter percent.
Nvidia posted better than expected results for the January quarter on Wednesday and forecast current quarter revenue above market estimates.
Woman Receives Gift Card for Christmas – Discovers It Is ‘Worth’ 63,000,000,000,000,000 Pounds
OpenAI CEO Sam Altman praises the rapid progress of Chinese tech companies.
North Korea's capital experiences a significant construction boom with the development of a new city district dubbed 'Pyonghattan'.
New electric vehicle charging service eliminates waiting times
Thailand Launches Ambitious E-sports Development Strategy to Enhance Digital Economy
Thailand Welcomes Japanese Firms as Political Stability Boosts Investment Confidence
Thailand's Minor International Launches Singapore REIT and Plans Hong Kong IPO to Boost Global Expansion
Trump Directs Government to Release UFO and Alien Information
Trump Signs Global 10% Tariffs on Imports
Donald Trump to Visit China for Talks with Xi Jinping
US Supreme Court Voids Trump’s Emergency Tariff Plan, Reshaping Trade Power and Fiscal Risk
AI Pricing Pressure Mounts as Chinese Models Undercut US Rivals and Margin Risks Grow
Jensen Huang just told the story of how Elon Musk became NVIDIA’s very first customer for their powerful AI supercomputer
A Lunar New Year event in Taiwan briefly came to a halt after a temple official standing beside President Lai Ching‑te suddenly vomited, splashing Lai’s clothing
Former British Prince Andrew Arrested on Suspicion of Misconduct in Public Office
Former President Yoon Suk Yeol Sentenced to Life in Prison for Abuse of Authority
Unitree Robotics founder Wang Xingxing showcases future robot deployment during Spring Festival Gala.
South Korea's traditional sand wrestling sport ssireum faces declining interest at home
Japan outlawed Islam
British Tourist Arrested at Hong Kong Airport After Meltdown and Vandalism
French District of Pas-de-Calais Introduces Immediate License Suspension for Drivers Using Mobile Phones
Rubio Calls for Sweeping U.N. Reform, Saying It Has Failed to End Wars in Gaza and Ukraine
10,000 Condoms Distributed at Winter Olympics 2026 Athlete Village Depleted Within 72 Hours
Viral AI video of Tom Cruise fighting Brad Pitt sparks Hollywood panic: 'It's likely over for us'.
China’s EV Makers Face Mandatory Return to Physical Buttons and Door Handles in Driver-Distraction Safety Overhaul
OpenAI and DeepCent Superintelligence Race: Artificial General Intelligence and AI Agents as a National Security Arms Race
South Korea’s Births Edge Up After Years of Decline, Raising Hopes — and Doubts
Japan’s Sanae Takaichi Secures Historic Supermajority After High-Stakes Snap Election
We will protect them from the digital Wild West.’ Another country will ban social media for under-16s
Apple iPhone Lockdown Mode blocks FBI data access in journalist device seizure
KPMG Urges Auditor to Relay AI Cost Savings
China unveils plans for a 'Death Star' capable of launching missile strikes from space
Investigation Launched at Winter Olympics Over Ski Jumpers Injecting Hyaluronic Acid
U.S. State Department Issues Urgent Travel Warning for Citizens to Leave Iran Immediately
Wall Street Erases All Gains of 2026; Bitcoin Plummets 14% to $63,000
Eighty-one-year-old man in the United States fatally shoots Uber driver after scam threat
Political Censorship: French Prosecutors Raid Musk’s X Offices in Paris
AI Invented “Hot Springs” — Tourists Arrived and Were Shocked
Tech Market Shifts and AI Investment Surge Drive Global Innovation and Layoffs
Global Shifts in War, Trade, Energy and Security Mark Major International Developments
Markets Jolt as AI Spending, US Policy Shifts, and Global Security Moves Drive New Volatility
Former South Korean First Lady Kim Keon Hee Sentenced to 20 Months for Bribery
Tesla Ends Model S and X Production and Sends $2 Billion to xAI as 2025 Revenue Declines
China Executes 11 Members of the Ming Clan in Cross-Border Scam Case Linked to Myanmar’s Lawkai
Starmer Signals UK Push for a More ‘Sophisticated’ Relationship With China in Talks With Xi
×