Visual Studio Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Visual Studio  Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Information:

Vscode (Visual studio code) is an editor program or simply called a programming tool. It is used to edit small but highly efficient code. It is suitable for developers at all levels, from beginners to professionals. It supports Windows, macOS and Linux, as well as many languages ​​such as JavaScript, TypeScript, Python, C ++ and others. It is easy to use and has many extensions or tools to facilitate the use.

Incident :

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free” and “Material Theme Icons Free,” from its marketplace after cybersecurity researchers discovered malicious code embedded within them.

  These extensions, developed by Mattia Astorino (also known as equinusocio), had amassed nearly 9 million installations combined, with Astorino’s total extension downloads exceeding 13 million.

  The investigation revealed that the malicious code was likely introduced through a compromised dependency or during a recent update.

  This suggests a possible supply chain attack or unauthorized access to the developer’s account.

The analysis revealed heavily obfuscated JavaScript code in the extensions, which included references to usernames and passwords. Although the exact purpose of this code remains unclear

  Threat actors often exploit open-source platforms like VS Code Marketplace to distribute harmful code under the guise of legitimate extensions.

  In this case, developers who installed these compromised extensions may have unknowingly exposed sensitive information or systems to potential breaches.

Solution :

 To mitigate risks, developers are advised to uninstall all extensions published by equinusocio, including:

  • equinusocio.moxer-theme
  • equinusocio.vsc-material-theme
  • equinusocio.vsc-material-theme-icons
  • equinusocio.vsc-community-material-theme
  • equinusocio.moxer-icons.

  This incident highlights the importance of scrutinizing third-party dependencies and maintaining robust supply chain security practices and avoid extensions with suspicious or obfuscated code .

 

The important things is Security systems. We must concern and monitor as usual.
For more information please contact
Email :sales@inetms.co.th
065 149 2822 (Ms.Suphatson )
063 204 4534 (Ms.Atsamaphorn)
065 929 6330 (Ms.Kansinee)
0613879439 (Ms.Sirilak)
0922576902 (Ms.Narusorn)

 

References :

Weekly Interesting CVE

NO.

CVE Name

Published Date

Last Update

Device/Appplication/OS Target

Attack Type

CVSS
Severity Rating

Detail

Solution

Reference

1

CVE-2025-21532

21/1/2025

25/2/2025

Oracle
Analytics Desktop Prior to 8.1.0

Local Privilege Escalation

7.8

Vulnerability in the Oracle Analytics Desktop product of Oracle Analytics (component: Install). Supported versions that are affected are Prior to 8.1.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Analytics Desktop executes to compromise Oracle Analytics Desktop. Successful attacks of this vulnerability can result in takeover of Oracle Analytics Desktop.

Upgrade to version 8.1.0.

https://vuldb.com/?id.292854
https://app.opencve.io/cve/CVE-2025-21532

2

CVE-2025-25746

12/2/2025

02/24/2025

D-Link
DIR-853 A1 FW1.20B07

Stack-based overflow

9.8

D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetWanSettings module.

Upgrade the firmware to the latest version

https://app.opencve.io/cve/CVE-2025-25746

3

CVE-2025-24989

19/2/2025

24/2/2025

Microsoft
Power Pages

Access control

8.2

An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control.

This vulnerability has already been mitigated

https://vuldb.com/?id.296331
https://app.opencve.io/cve/CVE-2025-24989

 

 4

CVE-2025-1756

27/2/2025

27/2/2025

Mongodb
mongosh prior to 2.3.0

privilege escalatio

7.5

mongosh may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privilege, when a crafted file is stored in C: ode_modules.

Upgrade to Version 2.3.0

https://jira.mongodb.org/browse/MONGOSH-2028
https://app.opencve.io/cve/CVE-2025-1756

5

CVE-2025-0975

28/2/2025

28/2/2025

IBM
9.1 LTS, 9.2 LTS, 9.3 LTS
9.3 CD, 9.4. LTS, 9.4 CD

code execution

8.8

IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD console could allow an authenticated user to execute code due to improper neutralization of escape characters.

9.1 LTS upgrade to 9.1.0.27
9.2 LTS upgrade to 9.2.0.31
9.3 LTS upgrade to 9.3.0.27
9.4 LTS upgrade to 9.4.0.10
9.3 CD and 9.4 CD upgrade to
IBM MQ version 9.4.2

https://www.ibm.com/support/pages/node/7184342

No

Campaign Name

Detection Date

Attack

Type

 

Description

 

Mitigation/Remediation

1

'Silver Fox' APT Skirts Windows Blocklist in BYOVD Attack

26/02/2025

Privilege Escalation & Defense Evasion, BYOVD, Payload: Gh0stRAT Malware

A Chinese cybercriminal group known as “Silver Fox” has exploited a vulnerability in the Truesight.sys driver, which is associated with Adlice’s Roguekiller anti-malware utility. Although Microsoft has a block list for vulnerable drivers, due to a bug in the TBS hash specification, version 2.0.2 of this driver was not blocked. As a result, the Silver Fox group was able to use this driver in a Bring Your Own Vulnerable Driver (BYOVD) attack that disables security software and installs the Gh0stRAT malware on the victim’s device.

  • Regularly update systems and software to the latest version
  • Use multi-factor authentication (MFA)
  • Train employees.

Ref: https://www.darkreading.com/cyber-risk/silver-fox-byovd-attack-windows-blocklist

18 March 2025

Viewed 89 time

Engine by shopup.com