Article Details
Scrape Timestamp (UTC): 2025-10-14 21:41:21.208
Original Article Text
Click to Toggle View
Malicious crypto-stealing VSCode extensions resurface on OpenVSX. A threat actor called TigerJack is constantly targeting developers with malicious extensions published on Microsoft's Visual Code (VSCode) marketplace and OpenVSX registry to steal cryptocurrency and plant backdoors. Two of the extensions, removed from VSCode after counting 17,000 downloads, are still present on OpenVSX. Furthermore, TigerJack republishes the same malicious code under new names on the VSCode marketplace. OpenVSX is a community-maintained open-source extension marketplace operating as an alternative to Microsoft’s platform, providing an independent, vendor-neutral registry. It is also the default marketplace for popular VSCode-compatible editors that are technically or legally restricted from VSCode, including Cursor and Windsurf. The campaign was spotted by researchers at Koi Security and has distributed at least 11 malicious VSCode extensions since the beginning of the year. The two of those extensions kicked from the VSCode marketplace are named C++ Playground and HTTP Format, and have been reintroduced on the platform through new accounts, the researchers say. When launched, C++ Playground registers a listener (‘onDidChangeTextDocument’) for C++ files to exfiltrate source code to multiple external endpoints. The listener fires about 500 milliseconds after edits to capture keystrokes in near-real time. According to Koi Security, HTTP Format works as advertised but secretly runs a CoinIMP miner in the background, using hardcoded credentials and configuration to mine crypto using the host’s processing power. The miner does not appear to implement any restrictions for resource usage, leveraging the entire computing power for its activity. Another category of malicious extensions from TigerJack (cppplayground, httpformat, and pythonformat) fetch JavaScript code from a hardcoded address and executes it on the host. The remote address (ab498.pythonanywhere.com/static/in4.js) is polled every 20 minutes, enabling arbitrary code execution without updating the extension. The researchers comment that, unlike the source code stealer and crypto miner, this third type is far more menacing, as they feature extended functionality. “TigerJack can dynamically push any malicious payload without updating the extension—stealing credentials and API keys, deploying ransomware, using compromised developer machines as entry points into corporate networks, injecting backdoors into your projects, or monitoring your activity in real-time.” – Koi Security The researchers say that TigerJack is "a coordinated multi-account operation" disguised by the illusion of independent developers with credible background such as GitHub repositories, branding, detailed feature lists, and extension names that resemble those of legitimate tools. Koi Security reported their findings to OpenVSX, but the registry maintainer has not responded by publication time and the two extensions remain available for download. Developers using the platform to source software are advised to only download packages from reputable and trustworthy publishers. The Security Validation Event of the Year: The Picus BAS Summit Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation. Don't miss the event that will shape the future of your security strategy
Daily Brief Summary
A threat actor known as TigerJack targets developers with malicious Visual Studio Code (VSCode) extensions, aiming to steal cryptocurrency and install backdoors.
Two compromised extensions, with 17,000 downloads, were removed from VSCode but remain available on OpenVSX, a community-maintained marketplace.
TigerJack republished the malicious code under new names, exploiting the open-source nature of these platforms to reach unsuspecting users.
Extensions like C++ Playground and HTTP Format can exfiltrate source code and run crypto miners, significantly impacting the host's processing power.
Another variant fetches and executes JavaScript from a remote server, allowing dynamic payload deployment, including credential theft and ransomware.
Koi Security researchers identified this campaign, noting the sophisticated use of multiple accounts and credible developer personas to evade detection.
Despite being reported, OpenVSX has yet to respond, leaving developers vulnerable; caution is advised when downloading extensions from unverified sources.