Article Details

Original Article Text

Click to Toggle View

AI-Slop ransomware test sneaks on to VS Code marketplace. A malicious extension with basic ransomware capabilities seemingly created with the help of AI, has been published on Microsoft's official VS Code marketplace. Named susvsex and published by ‘suspublisher18,' the extension's malicious functionality is openly advertised in its description. Secure Annex researcher John Tuckner discovered susvsex and says that it is the product of “vibe coding” and is far from sophisticated. Despite reporting the extension and its explicit description, which discloses file theft to a remote server and encryption of all files with AES-256-CBC, Microsoft ignored Tuckner’s report and did not remove it from the VS Code registry. How the ransomware extension works The extension activates on any event, including on installation or when launching VS Code, initializing the ‘extension.js’ file that contains its hardcoded variables (IP, encryption keys, command-and-control address). “Many of these values have comments which indicate that the code was not written directly by the publisher and very likely generated through AI,” says Tuckner. On activation, the extension calls a function named zipUploadAndEncrypt which checks the presence of a marker text file, and starts the encryption routine. It creates a .ZIP archive of the files in the defined target directory and exfiltrates them to the hardcoded C2 address. All the files are then replaced with their encrypted versions. Tucker found that the extension polls a private GitHub repository for commands, periodically checking an ‘index.html’ file that uses a PAT token for authentication, and tries to execute any commands there. By leveraging the hardcoded PAT, the researcher could access host information and discover that the owner of the repository is likely based in Azerbaijan. Because the extension is an overt threat, it may be the result of an experiment to test Microsoft’s vetting process. Secure Annex labels susvsex an ‘AI slop’ with its malicious actions exposed in the README file, but notes that a few tweaks would make it far more dangerous. BleepingComputer has contacted Microsoft about the issue, and we are waiting for their response. While susvsex was present at the time of writing this article, it was no longer available by publishing time. Secrets Security Cheat Sheet: From Sprawl to Control Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start. Get the cheat sheet and take the guesswork out of secrets management.

Daily Brief Summary

MALWARE // AI-Generated Ransomware Extension Found on VS Code Marketplace

A malicious extension named susvsex, created with AI assistance, was discovered on Microsoft's VS Code marketplace, featuring basic ransomware capabilities.

The extension, published by 'suspublisher18', openly advertised its malicious functions, including file theft and AES-256-CBC encryption.

Secure Annex researcher John Tuckner reported the extension, but Microsoft initially did not remove it, raising concerns about the vetting process.

The extension activates upon installation, using hardcoded variables and a function to encrypt and exfiltrate files to a command-and-control server.

It also polls a private GitHub repository for commands, revealing the repository owner may be based in Azerbaijan.

The extension's overt threat nature suggests it might be an experiment to test Microsoft's security measures, with potential for increased danger if refined.

The extension was removed from the marketplace by the time of article publication, following inquiries from BleepingComputer to Microsoft.