Dublin Times

Sovereignty, Pride, and Independence
Thursday, Dec 11, 2025

Hackers Are Hiding Malware in Open-Source Tools and IDE Extensions

The common belief that “open source is safe because everyone can inspect the code” is misleading. In reality, most open-source projects include add-ons and components that are not open source at all — and these hidden parts can easily contain spyware, malware, and viruses. Once installed, they can take over both the user’s computer and the servers running the so-called open-source code, giving hackers full control to do whatever they want.

A newly uncovered cyberattack—one of the most sophisticated developer-focused campaigns seen in recent years—is weaponizing the daily workflow of software engineers. 

Security companies have revealed a malicious operation in which attackers insert stealthy malware into seemingly harmless extensions and open-source tools used by tens of thousands of developers worldwide. 

These extensions appear completely legitimate, yet silently exfiltrate highly sensitive data such as passwords, Wi-Fi access credentials, authentication tokens, clipboard contents, and even live screenshots taken directly from developers’ machines.


Compromised VS Code Extensions: “Bitcoin Black” and “Codo AI”

Two Visual Studio Code extensions were confirmed to contain embedded malicious components: the Bitcoin Black theme and an AI assistant tool called Codo AI. Both extensions looked fully legitimate on the marketplace and performed their advertised functions, which helped them evade suspicion and achieve wide adoption.

Once installed, the extensions deployed an additional malicious payload that continuously harvested data from infected devices. The threat actors were not content with collecting passwords alone. The malware captured real-time screenshots of developers’ screens—revealing source code, Slack discussions, credentials, internal documentation, and confidential project directories.

This level of visibility allows attackers to map entire workflows, understand sensitive architectures, and target organizations with precision.


The Attack Technique: DLL Hijacking as a Delivery Vehicle

The operation relied on an advanced method known as DLL hijacking, which abuses the way legitimate software loads system libraries.

The attackers downloaded a real, benign screenshot tool (Lightshot) onto the victim’s machine, pairing it with a malicious DLL that carried the same filename as the tool’s expected library. When Lightshot launched, it automatically loaded the attacker’s counterfeit DLL. This triggered the malware’s execution without raising suspicion.

Security researchers found that the malware collected:

  • Continuous screenshots and clipboard data

  • Wi-Fi passwords and saved wireless credentials

  • Browser cookies, authentication tokens, and active sessions (via Chrome and Edge in headless mode)

  • Information about installed software, running processes, and development tools

Koi Security reports that the attackers have been iterating and improving the operation, increasingly using “clean” and innocuous-looking scripts to blend in with normal developer activity.


The Campaign Is Spreading Beyond VS Code

While the first findings emerged in VS Code, similar malicious injections are now appearing across the broader open-source ecosystem:

  • npm and Go: Malware packages imitating the names of popular, trusted libraries

  • Rust: A library called finch-rust masqueraded as a scientific computation tool, but instead loaded an additional malware component called sha-rust

This reflects a direct attack on the software supply chain—the trust mechanism developers rely on when importing packages, extensions, or dependencies. By compromising tools that sit at the heart of software development, attackers gain privileged access to entire organizations.


Why This Threat Is So Dangerous

A single developer installing one benign-looking extension can unknowingly trigger a breach across the entire company:

  • Theft of core, proprietary source code

  • Takeover of GitHub and other cloud development accounts

  • Infection of CI/CD pipelines and build environments

  • Exposure of sensitive customer data, credentials, and internal architecture

Because development environments are privileged by design—holding secrets, tokens, SSH keys, and code—the blast radius of compromise is enormous.

Traditional static code scanning is insufficient for detecting these attacks. The extensions themselves often appear legitimate or include harmless code alongside hidden payloads. What is required is real-time behavioral monitoringcapable of flagging anomalous actions—such as a theme extension attempting to access stored passwords.


Recommended Security Measures for Developers and Organizations

To reduce exposure, cybersecurity firms recommend the following defensive steps:

  1. Enable multi-factor authentication on all development accounts, including GitHub, GitLab, cloud providers, and CI/CD tools.

  2. Verify the identity and reputation of extension publishers before installation.

  3. Avoid anonymous, poorly reviewed, or unknown plugins—even if they appear harmless.

  4. Adopt security tools that include behavioral detection, not only static scanning.

  5. Treat all AI-powered development tools with caution, especially those requesting elevated system permissions.

  6. Conduct regular audits of development environments, including browser sessions, secrets, stored tokens, and installed extensions.


This attack marks a turning point in developer-focused cybercrime. 

By targeting the very tools that developers rely on daily, attackers gain unprecedented access to the global software ecosystem. The findings underscore the urgent need for stronger supply-chain security, rigorous extension vetting, and behavioral monitoring to defend the world’s most sensitive development workflows.

Newsletter

Related Articles

0:00
0:00
Close
Hackers Are Hiding Malware in Open-Source Tools and IDE Extensions
Zelenskyy Signals Progress Toward Ending the War: ‘One of the Hardest Moments in History’ (end of his business model?)
The U.S. State Department Announces That Mass Migration Constitutes an Existential Threat to Western Civilization and Undermines the Stability of Key American Allies
King Charles Strips Prince Andrew of Titles and Royal Residence
AI and Cybersecurity at Forefront as GITEX Global 2025 Kicks Off in Dubai
Ex-Microsoft Engineer Confirms Famous Windows XP Key Was Leaked Corporate License, Not a Hack
UK Police Crack Major Gang in Smuggling of up to 40,000 Stolen Phones to China
Wave of Complaints Against Apple Over iPhone 17 Pro’s Scratch Sensitivity
Altman Says GPT-5 Already Outpaces Him, Warns AI Could Automate 40% of Work
Russian Research Vessel 'Yantar' Tracked Mapping Europe’s Subsea Cables, Raising Security Alarms
Björn Borg Breaks Silence: Memoir Reveals Addiction, Shame and Cancer Battle
Trump Orders $100,000 Fee on H-1B Visas and Launches ‘Gold Card’ Immigration Pathway
Federal Reserve Cuts Rates by Quarter Point and Signals More to Come
New OpenAI Study Finds Majority of ChatGPT Use Is Personal, Not Professional
Musk calls for new UK government at huge pro-democracy rally in London, but Britons have been brainwashed to obey instead of fighting for their human rights
Queen Camilla’s Teenage Courage: Fended Off Attempted Assault on London Train, New Biography Reveals
Scottish Brothers Set Record in Historic Pacific Row
UK Government Delays Decision on China’s Proposed London Embassy Amid Concerns Over Redacted Plans
Kemi Badenoch has branded Robert Jenrick's supporters as "sore losers" after backing him to replace her as Conservative leader
High-Stakes Trump-Putin Summit on Ukraine Underway in Alaska
New Road Safety Measures Proposed in the UK: Focus on Eye Tests and Stricter Drink-Driving Limits
Australia to Recognize the State of Palestine at UN Assembly
Scotland’s First Minister Meets Trump Amid Visit Highlighting Whisky Tariffs, Gaza Crisis and Heritage Links
WhatsApp Deletes 6.8 Million Scam Accounts Amid Rising Global Fraud
U.S. Tariff Policy Triggers Market Volatility Amid Growing Global Trade Tensions
Tariffs, AI, and the Shifting U.S. Macro Landscape: Navigating a New Economic Regime
British Tourist Dies Following Hair Transplant in Turkey, Police Investigate
WhatsApp Users Targeted in New Scam Involving Account Takeovers
JD Vance Warns Europe Faces “Civilizational Suicide” Over Open Borders and Speech Limits
J.K. Rowling Limits Public Engagements Citing Safety Fears
UN's Top Court Declares Environmental Protection a Legal Obligation Under International Law
"Crazy Thing": OpenAI's Sam Altman Warns Of AI Voice Fraud Crisis In Banking
Centrist Criticism of von der Leyen Resurfaces as she Survives EU Confidence Vote
Apple Closes $16.5 Billion Tax Dispute With Ireland
Trump Announces Coca-Cola to Shift to Cane Sugar in U.S. Production
UK and Germany Collaborate on Global Military Equipment Sales
Irish Tech Worker Detained 100 days by US Authorities for Overstaying Visa
Jamie Dimon Warns Europe Is Losing Global Competitiveness and Flags Market Complacency
Excavation Begins at Site of Mass Grave for Children at Former Irish Institution
AI Raises Alarms Over Long-Term Job Security
Poland Implements Border Checks Amid Growing Migration Tensions
Amazon Reaches Major Automation Milestone with Over One Million Robots
Extreme Heat Wave Sweeps Across Europe, Hitting Record Temperatures
Germany Votes to Suspend Family Reunification for Asylum Seekers
NATO Members Agree to 5% Defense Spending Target by 2035
US strikes Iran nuclear sites, Trump says
Former Welsh First Minister Addresses Unionist Concerns Over Irish Language
€20 Million Lucan House Park Project Announced
UK and EU Reach New Economic Agreement
Europe's Strategic Push to Challenge Dollar Dominance
×