Monday, April 28, 2025
HomeCyber Security NewsMalicious Supply Chain Attacking Moving From npm Community To VSCode Marketplace

Malicious Supply Chain Attacking Moving From npm Community To VSCode Marketplace

Published on

SIEM as a Service

Follow Us on Google News

Researchers have identified a rise in malicious activity on the VSCode Marketplace, highlighting the vulnerability of the platform to supply chain attacks similar to those previously seen in the npm community.

Malicious actors are increasingly exploiting npm packages to distribute malicious code, mirroring tactics previously used in VSCode extensions that involve the npm package etherscancontracthandler, which highlights this evolving threat, underscoring the need for vigilance in both ecosystems.

VSCode extensions, built with Node.js and npm packages, can introduce vulnerabilities due to their potential to include compromised npm dependencies.

- Advertisement - Google News

While extensions are often seen as safe, their reliance on external packages makes them a potential attack vector. 

Malicious npm packages, potentially installed in VSCode, can compromise local development environments, highlighting the risk of supply chain attacks and the need for rigorous package security checks.

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

A campaign involving 18 malicious VSCode extensions with downloader functionality emerged in October 2024. 

VoiceMod.VoiceMod’s inflated number of installs and fabricated reviews
VoiceMod.VoiceMod’s inflated number of installs and fabricated reviews

A sophisticated cryptocurrency-themed phishing campaign evolved into a targeted attack against Zoom users as malicious browser extensions were developed, disguised as legitimate tools, to deceive victims into installing malware, which employed deceptive tactics like inflated download counts and fabricated reviews to increase credibility.

The malicious extensions, disguised as Solidity Language support for Visual Studio Code, employed JavaScript Obfuscator to conceal a simple script, which downloaded a second-stage payload from various domains, including some seemingly legitimate ones like Microsoft and CaptchaCDN, to deceive users.

A malicious npm package, etherscancontracthandler, was published by a threat actor targeting the crypto community, which is similar to malicious VSCode extensions, and downloaded a secondary payload from specific domains using a consistent string identifier.

Malicious code from VSCode extensions Ethereum.SoliditySupport
Malicious code from VSCode extensions Ethereum.SoliditySupport

VSCode extensions and npm packages were found to contain obfuscated malicious code with similar structures. Upon detection, the malicious npm package was reported and promptly removed, limiting its impact to approximately 350 downloads.

IDEs and their extensions pose significant security risks due to their potential for malicious exploitation.

Regular security assessments of IDEs and their dependencies are crucial to prevent unauthorized access and compromise of the development environment and supply chain.

Reversing Labs highlights the vulnerability of software supply chains, specifically npm and VSCode ecosystems. Malicious actors can easily compromise packages, introducing backdoors and data theft risks. 

It is important for organizations and developers to carefully evaluate the dependencies of third parties and implement robust security solutions in order to mitigate this risk.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Rack Ruby Framework Vulnerabilities Let Attackers Inject and Manipulate Log Content

Researchers Thai Do and Minh Pham have exposed multiple critical vulnerabilities in the Rack...

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Rack Ruby Framework Vulnerabilities Let Attackers Inject and Manipulate Log Content

Researchers Thai Do and Minh Pham have exposed multiple critical vulnerabilities in the Rack...

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...