Article Details
Scrape Timestamp (UTC): 2025-07-14 12:28:46.792
Original Article Text
Click to Toggle View
Malicious VSCode extension in Cursor IDE led to $500K crypto theft. A fake extension for the Cursor AI IDE code editor infected devices with remote access tools and infostealers, which, in one case, led to the theft of $500,000 in cryptocurrency from a Russian crypto developer. Cursor AI IDE is an AI-powered development environment based on Microsoft's Visual Studio Code. It includes support for Open VSX, an alternative to the Visual Studio Marketplace, that allows you to install VSCode-compatible extensions to expand the software's functionality. Kaspersky reports that they were called in to investigate a security incident where a Russian developer working in cryptocurrency reported that $500,00 in crypto was stolen from his computer. The machine had no antivirus software installed, but it was said to be clean. Georgy Kucherin, a security researcher for Kaspersky, received an image of the device's hard drive, and after analyzing it, discovered a malicious JavaScript file named extension.js located in the .cursor/extensions directory. The extension was named "Solidity Language" and was published on the Open VSX registry, claiming to be a syntax highlighting tool for working with Ethereum smart contracts Although the plugin impersonated the legitimate Solidity syntax highlighting extension, it actually executed a PowerShell script from a remote host at angelic[.]su to download additional malicious payloads. The remote PowerShell script checked if the remote management tool ScreenConnect was already installed, and if not, executed another script to install it. Once ScreenConnect was installed, the threat actors gained full remote access to the developer's computer. Using ScreenConnect, the threat actor uploaded and executed VBScript files that were used to download additional payloads to the device. The final script in the attack downloaded a malicious executable from archive[.]org that contained a loader known as VMDetector, which installed: According to Kaspersky, Open VSX showed that the extension had been downloaded 54,000 times before it was removed on July 2. However, the researchers believe that this install count was artificially inflated to give it a sense of legitimacy. A day later, the attackers published an almost identical version under the name "solidity," inflating the install count for this extension to nearly two million. Kaspersky says the threat actors were able to rank their extension higher than the legitimate one in Open VSX search results by gaming the algorithm and through the inflated install count. This caused the victim to install the malicious extension, thinking it was the legitimate one. The researchers found similar extensions published to Microsoft's Visual Studio Code marketplace named "solaibot", "among-eth", and "blankebesxstnion," which also executed a PowerShell script to install ScreenConnect and infostealers. Kaspersky warns that developers should be wary of downloading packages and extensions from open repositories as they have become a common source of malware infections. "Malicious packages continue to pose a significant threat to the crypto industry. Many projects today rely on open-source tools downloaded from package repositories," concludes Kaspersky. "Unfortunately, packages from these repositories are often a source of malware infections. Therefore, we recommend extreme caution when downloading any tools. Always verify that the package you're downloading isn't a fake." "If a package doesn't work as advertised after you install it, be suspicious and check the downloaded source code." 8 Common Threats in 2025 While cloud attacks may be growing more sophisticated, attackers still succeed with surprisingly simple techniques. Drawing from Wiz's detections across thousands of organizations, this report reveals 8 key techniques used by cloud-fluent threat actors.
Daily Brief Summary
A malicious VSCode extension named "Solidity Language" from the Open VSX registry led to the theft of $500,000 in cryptocurrency.
The fake extension was designed to impersonate a legitimate plugin for Ethereum smart contracts, but instead executed a remote PowerShell script.
The attackers used the script to install ScreenConnect, gaining full remote access to the victim's computer.
Additional malicious payloads were subsequently downloaded, including a known malware loader.
The victim, a Russian crypto developer, did not have antivirus software installed, complicating the detection of the intruding software.
Kaspersky's investigation revealed that the extension had been downloaded 54,000 times, though this figure was likely inflated to boost its apparent legitimacy.
Similar deceptive extensions were found in Microsoft's Visual Studio Code marketplace, suggesting a broader attack strategy.
Kaspersky advises developers to exercise extreme caution when downloading tools and packages from open repositories, as these platforms are increasingly targeted by cybercriminals.