Article Details

Scrape Timestamp (UTC): 2026-01-26 15:50:06.708

Source: https://thehackernews.com/2026/01/malicious-vs-code-ai-extensions-with-15.html

Original Article Text

Click to Toggle View

Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code. Cybersecurity researchers have discovered two malicious Microsoft Visual Studio Code (VS Code) extensions that are advertised as artificial intelligence (AI)-powered coding assistants, but also harbor covert functionality to siphon developer data to China-based servers. The extensions, which have 1.5 million combined installs and are still available for download from the official Visual Studio Marketplace, are listed below - Koi Security said the extensions are functional and work as expected, but they also capture every file being opened and every source code modification to servers located in China without users' knowledge or consent. The campaign has been codenamed MaliciousCorgi. "Both contain identical malicious code -- the same spyware infrastructure running under different publisher names," security researcher Tuval Admoni said. What makes the activity particularly dangerous is that the extensions work exactly as advertised, providing autocomplete suggestions and explaining coding errors, thereby avoiding raising any red flags and lowering the users' suspicion. At the same time, the embedded malicious code is designed to read all of the contents of every file being opened, encode it in Base64 format, and send it to a server located in China ("aihao123[.]cn"). The process is triggered for every edit. The extensions also incorporate a real-time monitoring feature that can be remotely triggered by the server, causing up to 50 files in the workspace to be exfiltrated. Also present in the extension's web view is a hidden zero-pixel iframe that loads four commercial analytics software development kits (SDKs) to fingerprint the devices and create extensive user profiles. The four SDKs used are Zhuge.io, GrowingIO, TalkingData, and Baidu Analytics, all of which are major data analytics platforms based in China. PackageGate Flaws Affect JavaScript Package Managers The disclosure comes as the supply chain security company said it identified six zero-day vulnerabilities in JavaScript package managers like npm, pnpm, vlt, and Bun that could be exploited to defeat security controls put in place to skip the automatic execution of lifecycle scripts during package installation. The flaws have been collectively named PackageGate. Defenses such as disabling lifecycle scripts ("--ignore-scripts") and committing lockfiles ("package-lock.json") have become crucial mechanisms to confronting supply chain attacks, especially in the aftermath of Shai-Hulud, which leverages postinstall scripts to spread in a worm-like manner to hijack npm tokens and publish malicious versions of the packages to the registry. However, Koi found that it's possible to bypass script execution and lockfile integrity checks in the four package managers. Following responsible disclosure, the issues have been addressed in pnpm (version 10.26.0), vlt (version 1.0.0-rc.10), and Bun (version 1.3.5). Pnpm is tracking the two vulnerabilities as CVE-2025-69264 (CVSS score: 8.8) and CVE-2025-69263 (CVSS score: 7.5). Npm, however, has opted not to fix the vulnerability, stating "users are responsible for vetting the content of packages that they choose to install." The Hacker News has reached out to npm/GitHub for further comment, and we will update the story if we hear back. "The standard advice, disable scripts and commit your lockfiles, is still worth following," security researcher Oren Yomtov said. "But it's not the complete picture. Until PackageGate is fully addressed, organizations need to make their own informed choices about risk."

Daily Brief Summary

MALWARE // Malicious VS Code Extensions Compromise Developer Source Code Security

Researchers identified two malicious Visual Studio Code extensions posing as AI coding assistants, secretly exfiltrating developer data to servers in China, with 1.5 million installations recorded.

The extensions operate as advertised, offering coding suggestions while covertly capturing and transmitting file contents and modifications without user consent.

The malicious code encodes data in Base64 format and sends it to a Chinese server, triggered with every file edit, raising significant data security concerns.

A real-time monitoring feature can be remotely activated, allowing up to 50 files to be exfiltrated from the user's workspace, increasing potential data loss.

Embedded within the extensions is a hidden zero-pixel iframe loading four Chinese analytics SDKs, enabling device fingerprinting and extensive user profiling.

The discovery of these extensions underscores the need for vigilance in vetting third-party tools, particularly those with access to sensitive development environments.

Organizations are urged to review installed extensions and consider security measures to protect against unauthorized data access and exfiltration.