Friday, May 9, 2025
Homecyber securityMalicious VS Code Extensions with Millions of Installs Put Developers at Risk

Malicious VS Code Extensions with Millions of Installs Put Developers at Risk

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated cryptomining campaign has been uncovered, targeting developers through malicious Visual Studio Code (VS Code) extensions.

These extensions, masquerading as legitimate tools, have collectively accumulated over one million installations, exposing the scale of the attack.

Researchers at ExtensionTotal detected the operation, which deploys a multi-stage payload to mine cryptocurrency in the background while delivering the expected functionality to avoid suspicion.

- Advertisement - Google News
Malicious VS Code Extensions
Multistage Payload Flow

Attack Overview

The malicious campaign involved ten VS Code extensions published by three different authors, primarily “Mark H,” starting April 4, 2025.

Among them, the most popular fake extension, “Discord Rich Presence,” reached 189,000 installs, while “Prettier Code for VSCode” accumulated an inflated count of 955,000 installs.

These extensions were uploaded to impersonate widely trusted development tools, and attackers even installed the legitimate versions of these extensions after deploying their malware to maintain credibility.

Once installed, the extensions secretly downloaded and executed a PowerShell loader from a recently created Command-and-Control (C2) domain, asdf11[.]xyz.

This script performed multiple malicious actions, including disabling Windows security measures, establishing persistence through scheduled tasks and registry modifications, and installing the XMRig cryptominer, which mines Monero cryptocurrency.

Payload Details

Malicious behavior from extension’s report on ExtensionTotal

The campaign exhibited an advanced multi-stage process. The initial PowerShell script executed upon extension installation was responsible for persistence, defense evasion, privilege escalation, and payload execution.

The script set up a scheduled task disguised as “OneDriveStartup” and created registry entries to ensure persistence.

It disabled security services such as Windows Update and Update Medic Service, thereby preventing system protections from interfering with the malware.

To evade detection, the script excluded its installation directory from Windows Defender scans.

It also escalated privileges by attempting to run the payload as an administrator.

In cases where sufficient privileges were not available, it exploited the legitimate “ComputerDefaults.exe” in the System32 directory to execute a malicious DLL named “MLANG.dll.”

Finally, the script downloaded and executed “Launcher.exe”a Trojan that communicated with another C2 domain, myaunet[.]su, to install the XMRig cryptomining software.

According to the Report, This campaign highlights the growing threat of supply chain attacks on developer ecosystems.

Developers installing malicious extensions unknowingly expose their systems and potentially their organizations to cryptomining and other cyber risks.

By disguising these extensions as legitimate tools and delivering expected functionality, attackers leveraged the trust within the VS Code extension marketplace to infiltrate systems unnoticed.

Indicator of Compromise (IoCs)

Several Indicators of Compromise (IoCs) have been identified in this operation:

1.C2 Domains: The extensions communicated with asdf11[.]xyz and myaunet[.]su for payload downloads and cryptominer deployment.
2.Malicious File Hashes: Key files deployed during the campaign include:

    • Launcher.exe (SHA-256: 2d17f0cb6c8d9488f2d101b90052692049b0c4bd9bf4949758aae7b1fd936191)
    • XMRig.exe (SHA-256: d2fcf28897ddc2137141d838b734664ff7592e03fcd467a433a51cb4976b4fb1)
    • PowerShell scripts (Multiple hashes shared across the campaign)
    • Malicious DLLs (SHA-256: 13db408a3232ea31aab8edc648b6c315782db9516e1c08c6bd667e17f5dd147c)

    3.Affected Extensions: Notable malicious VS Code packages include:

      • Prettier — Code for VSCode (prettierteam.prettier)
      • Discord Rich Presence (markh.discord-rich-presence-vs)
      • Rojo — Roblox Studio Sync (evaera-rbx.vscode-rojo-rbx)
      • Solidity Compiler (vscodedeveloper.sobidity-compiler)

      These IoCs serve as critical markers for organizations to detect and mitigate the impact of the campaign.

      This cryptomining scheme underscores the urgent need for vigilance in the software supply chain.

      With developers increasingly reliant on third-party extensions, malicious campaigns like these exploit the trust and convenience of extension marketplaces to infiltrate systems.

      Organizations must prioritize extension vetting, employ advanced detection tools, and scrutinize open-source contributions to safeguard their ecosystems.

      ExtensionTotal remains committed to helping development teams identify and address such threats, ensuring uninterrupted productivity without compromising security.

      Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

      Aman Mishra
      Aman Mishra
      Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

      Latest articles

      Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

      Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

      IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

      A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

      Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

      Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

      Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

      Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

      Resilience at Scale

      Why Application Security is Non-Negotiable

      The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

      Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

      Discussion points


      Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
      Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
      Ensuring 100% application availability through platforms architected for failure resilience.
      Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

      More like this

      Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

      Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

      IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

      A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

      Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

      Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...