Security researchers have identified a malicious campaign targeting developers through a compromised extension distributed via the Open VSX Registry. Disguised as a GitHub downloader utility, the extension appeared legitimate but secretly delivered malware designed to harvest sensitive developer information. The incident highlights ongoing risks within third-party extension ecosystems commonly used in modern development environments. The extension included functional components built with Angular and TypeScript to maintain credibility, while embedding hidden malicious logic. Once installed, the payload was activated during routine developer activity, such as opening or interacting with HTML or TypeScript files. This approach allowed the malware to operate discreetly without raising immediate suspicion. To conceal its behavior, the malicious code used AES-256-CBC encryption, decrypting its payload only at runtime. It established command-and-control communication through infrastructure leveraging the Solana network, complicating detection and takedown efforts. Additional fallback communication channels, including abused Google Calendar links, ensured continued connectivity even if primary infrastructure became unavailable. The campaign focused on collecting high-value data from compromised systems, including credentials for GitHub and npm, OAuth tokens, browser-stored authentication information, and cryptocurrency wallet data. The malware also employed techniques such as terminating browser processes to access locked storage and validating stolen credentials in real time, increasing the effectiveness of the attack. The incident underscores the importance of verifying the trustworthiness of third-party extensions before installation.
Cisco firewall appliances are actively being targeted through critical zero-day vulnerabilities that enable unauthenticated attackers to gain full control over affected systems. Th...
The ransomware group LeakNet is expanding operations by developing its own infection and execution infrastructure, reducing reliance on initial access brokers. key innovation in it...
A newly observed ransomware strain, Warlock, is leveraging the Bring Your Own Vulnerable Driver (BYOVD) technique to bypass security defenses and gain elevated privileges on compro...