Description

A cyber threat actor named TigerJack has been attacking developers by posting malicious add-ons on both Microsoft's Visual Studio Code (VSCode) Marketplace and the open-source OpenVSX registry. Although taken down from the official Microsoft platform after it attracted more than 17,000 downloads, two extensions C++ Playground and HTTP Format continue to be available on OpenVSX. Even worse, TigerJack has kept re-publishing the same harmful code with different names and accounts, thus complicating detection and removal. The campaign, which was discovered by researchers from Koi Security, comprises at least 11 malware extensions and is part of a grand scheme to steal information, mine cryptocurrency, and run arbitrary code on developer machines. The attack takes advantage of OpenVSX's lower review standards and popularity with VSCode-compatible editors such as Cursor and Windsurf, which do not utilize Microsoft's marketplace. The C++ Playground extension plagiarizes source code in virtual real-time by installing document listeners, and HTTP Format silently opens a CoinIMP cryptominer utilizing the full processing capabilities of the system. A third type retrieves JavaScript code from a hardcoded distant URL periodically, a feature which enables remote code execution without an update to the extension, hence making it the riskiest in the lot. The baleful tools are disguised using professional logos, replica feature sets, and fake GitHub repository links. To safeguard themselves, developers are advised to download extensions from only trusted and established publishers. All packages downloaded should be examined for malicious activity, and tools such as OpenVSX need to enhance moderation and reaction to security reports. Vigilance and concern continue to be vital in evading supply chain attacks in development environments.