Arab Press

بالشعب و للشعب
Wednesday, Dec 10, 2025

Hackers Are Hiding Malware in Open-Source Tools and IDE Extensions

The common belief that “open source is safe because everyone can inspect the code” is misleading. In reality, most open-source projects include add-ons and components that are not open source at all — and these hidden parts can easily contain spyware, malware, and viruses. Once installed, they can take over both the user’s computer and the servers running the so-called open-source code, giving hackers full control to do whatever they want.

A newly uncovered cyberattack—one of the most sophisticated developer-focused campaigns seen in recent years—is weaponizing the daily workflow of software engineers. 

Security companies have revealed a malicious operation in which attackers insert stealthy malware into seemingly harmless extensions and open-source tools used by tens of thousands of developers worldwide. 

These extensions appear completely legitimate, yet silently exfiltrate highly sensitive data such as passwords, Wi-Fi access credentials, authentication tokens, clipboard contents, and even live screenshots taken directly from developers’ machines.


Compromised VS Code Extensions: “Bitcoin Black” and “Codo AI”

Two Visual Studio Code extensions were confirmed to contain embedded malicious components: the Bitcoin Black theme and an AI assistant tool called Codo AI. Both extensions looked fully legitimate on the marketplace and performed their advertised functions, which helped them evade suspicion and achieve wide adoption.

Once installed, the extensions deployed an additional malicious payload that continuously harvested data from infected devices. The threat actors were not content with collecting passwords alone. The malware captured real-time screenshots of developers’ screens—revealing source code, Slack discussions, credentials, internal documentation, and confidential project directories.

This level of visibility allows attackers to map entire workflows, understand sensitive architectures, and target organizations with precision.


The Attack Technique: DLL Hijacking as a Delivery Vehicle

The operation relied on an advanced method known as DLL hijacking, which abuses the way legitimate software loads system libraries.

The attackers downloaded a real, benign screenshot tool (Lightshot) onto the victim’s machine, pairing it with a malicious DLL that carried the same filename as the tool’s expected library. When Lightshot launched, it automatically loaded the attacker’s counterfeit DLL. This triggered the malware’s execution without raising suspicion.

Security researchers found that the malware collected:

  • Continuous screenshots and clipboard data

  • Wi-Fi passwords and saved wireless credentials

  • Browser cookies, authentication tokens, and active sessions (via Chrome and Edge in headless mode)

  • Information about installed software, running processes, and development tools

Koi Security reports that the attackers have been iterating and improving the operation, increasingly using “clean” and innocuous-looking scripts to blend in with normal developer activity.


The Campaign Is Spreading Beyond VS Code

While the first findings emerged in VS Code, similar malicious injections are now appearing across the broader open-source ecosystem:

  • npm and Go: Malware packages imitating the names of popular, trusted libraries

  • Rust: A library called finch-rust masqueraded as a scientific computation tool, but instead loaded an additional malware component called sha-rust

This reflects a direct attack on the software supply chain—the trust mechanism developers rely on when importing packages, extensions, or dependencies. By compromising tools that sit at the heart of software development, attackers gain privileged access to entire organizations.


Why This Threat Is So Dangerous

A single developer installing one benign-looking extension can unknowingly trigger a breach across the entire company:

  • Theft of core, proprietary source code

  • Takeover of GitHub and other cloud development accounts

  • Infection of CI/CD pipelines and build environments

  • Exposure of sensitive customer data, credentials, and internal architecture

Because development environments are privileged by design—holding secrets, tokens, SSH keys, and code—the blast radius of compromise is enormous.

Traditional static code scanning is insufficient for detecting these attacks. The extensions themselves often appear legitimate or include harmless code alongside hidden payloads. What is required is real-time behavioral monitoringcapable of flagging anomalous actions—such as a theme extension attempting to access stored passwords.


Recommended Security Measures for Developers and Organizations

To reduce exposure, cybersecurity firms recommend the following defensive steps:

  1. Enable multi-factor authentication on all development accounts, including GitHub, GitLab, cloud providers, and CI/CD tools.

  2. Verify the identity and reputation of extension publishers before installation.

  3. Avoid anonymous, poorly reviewed, or unknown plugins—even if they appear harmless.

  4. Adopt security tools that include behavioral detection, not only static scanning.

  5. Treat all AI-powered development tools with caution, especially those requesting elevated system permissions.

  6. Conduct regular audits of development environments, including browser sessions, secrets, stored tokens, and installed extensions.


This attack marks a turning point in developer-focused cybercrime. 

By targeting the very tools that developers rely on daily, attackers gain unprecedented access to the global software ecosystem. The findings underscore the urgent need for stronger supply-chain security, rigorous extension vetting, and behavioral monitoring to defend the world’s most sensitive development workflows.

Newsletter

Related Articles

Arab Press
0:00
0:00
Close
Hackers Are Hiding Malware in Open-Source Tools and IDE Extensions
Traveling to USA? Homeland Security moving toward requiring foreign travelers to share social media history
Wall Street Analysts Clash With Riyadh Over Saudi Arabia’s Deficit Outlook
Trump and Saudi Crown Prince Cement $1 Trillion-Plus Deals in High-Profile White House Summit
Saudi Arabia Opens Alcohol Sales to Wealthy Non-Muslim Residents Under New Access Rules
U.S.–Saudi Rethink Deepens — Washington Moves Ahead Without Linking Riyadh to Israel Normalisation
Saudi Arabia and Israel Deprioritise Diplomacy: Normalisation No Longer a Middle-East Priority
As Trump Deepens Ties with Saudi Arabia, Push for Israel Normalization Takes a Back Seat
Thai Food Village Debuts at Saudi Feast Food Festival 2025 Under Thai Commerce Minister Suphajee’s Lead
Saudi Arabia Sharpens Its Strategic Vision as Economic Transformation Enters New Phase
Saudi Arabia Projects $44 Billion Budget Shortfall in 2026 as Economy Rebalances
OPEC+ Unveils New Capacity-Based System to Anchor Future Oil Output Levels
Hong Kong Residents Mourn Victims as 1,500 People Relocated After Devastating Tower Fire
Saudi Arabia’s SAMAI Initiative Surpasses One-Million-Citizen Milestone in National AI Upskilling Drive
Saudi Arabia’s Specialty Coffee Market Set to Surge as Demand Soars and New Exhibition Drops in December
Saudi Arabia Moves to Open Two New Alcohol Stores for Foreigners Under Vision 2030 Reform
Saudi Arabia’s AI Ambitions Gain Momentum — but Water, Talent and Infrastructure Pose Major Hurdles
Tensions Surface in Trump-MBS Talks as Saudi Pushes Back on Israel Normalisation
Saudi Arabia Signals Major Maritime Crack-Down on Houthi Routes in Red Sea
Italy and Saudi Arabia Seal Over 20 Strategic Deals at Business Forum in Riyadh
COP30 Ends Without Fossil Fuel Phase-Out as US, Saudi Arabia and Russia Align in Obstruction Role
Saudi-Portuguese Economic Horizons Expand Through Strategic Business Council
DHL Commits $150 Million for Landmark Logistics Hub in Saudi Arabia
Saudi Aramco Weighs Disposals Amid $10 Billion-Plus Asset Sales Discussion
Trump Hosts Saudi Crown Prince for Major Defence and Investment Agreements
Families Accuse OpenAI of Enabling ‘AI-Driven Delusions’ After Multiple Suicides
Riyadh Metro Records Over One Hundred Million Journeys as Saudi Capital Accelerates Transit Era
Trump’s Grand Saudi Welcome Highlights U.S.–Riyadh Pivot as Israel Watches Warily
U.S. Set to Sell F-35 Jets to Saudi Arabia in Major Strategic Shift
Saudi Arabia Doubles Down on U.S. Partnership in Strategic Move
Saudi Arabia Charts Tech and Nuclear Leap Under Crown Prince’s U.S. Visit
Trump Elevates Saudi Arabia to Major Non-NATO Ally Amid Defense Deal
Trump Elevates Saudi Arabia to Major Non-NATO Ally as MBS Visit Yields Deepened Ties
Iran Appeals to Saudi Arabia to Mediate Restart of U.S. Nuclear Talks
Musk, Barra and Ford Join Trump in Lavish White House Dinner for Saudi Crown Prince
Lawmaker Seeks Declassification of ‘Shocking’ 2019 Call Between Trump and Saudi Crown Prince
US and Saudi Arabia Forge Strategic Defence Pact Featuring F-35 Sale and $1 Trillion Investment Pledge
Saudi Sovereign Wealth Fund Emerges as Key Contender in Warner Bros. Discovery Sale
Trump Secures Sweeping U.S.–Saudi Agreements on Jets, Technology and Massive Investment
Detroit CEOs Join White House Dinner as U.S.–Saudi Auto Deal Accelerates
Netanyahu Secures U.S. Assurance That Israel’s Qualitative Military Edge Will Remain Despite Saudi F-35 Deal
Ronaldo Joins Trump and Saudi Crown Prince’s Gala Amid U.S.–Gulf Tech and Investment Surge
U.S.–Saudi Investment Forum Sees U.S. Corporate Titans and Saudi Royalty Forge Billion-Dollar Ties
Elon Musk’s xAI to Deploy 500-Megawatt Saudi Data Centre with State-backed Partner HUMAIN
U.S. Clears Export of Advanced AI Chips to Saudi Arabia and UAE Amid Strategic Tech Partnership
xAI Selects Saudi Data-Centre as First Customer of Nvidia-Backed Humain Project
President Trump Hosts Saudi Crown Prince Mohammed bin Salman in Washington Amid Strategic Deal Talks
Saudi Crown Prince to Press Trump for Direct U.S. Role in Ending Sudan War
Trump Hosts Saudi Crown Prince: Five Key Takeaways from the White House Meeting
Trump Firmly Defends Saudi Crown Prince Over Khashoggi Murder Amid Washington Visit
×