IDE Extensions Like VSCode Let Attackers Bypass Trust Checks and Malware on Developer Machines

A critical security vulnerability has been discovered in popular Integrated Development Environments (IDEs) that allows malicious actors to bypass trust verification systems and execute code on developer machines while maintaining the appearance of legitimate, verified extensions. The vulnerability enables attackers to create malicious extensions that retain verified symbols and trusted publisher information while secretly containing code capable of executing operating system commands. Researchers discovered that by modifying specific values within the extension’s bundled files, particularly the package.json and extension.js files, attackers can maintain the verified appearance while introducing malicious code. The vulnerability’s impact extends beyond simple code execution, as successful exploitation provides attackers with access to the developer’s complete working environment, including source code, development databases, API keys, and deployment credentials. The flaw affects some of the most widely used development platforms including Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor, potentially exposing millions of developers worldwide to sophisticated supply chain attacks. OX Security analysts identified the specific mechanism through which these trust checks can be circumvented, demonstrating how extensions can be packaged into VSIX files and distributed through platforms like GitHub while appearing completely legitimate to end users. Research conducted between May and June 2025 revealed that attackers can modify extension files to maintain verified status while injecting malicious functionality. Attackers begin by analyzing legitimate verified extensions to extract their publisher information, extension IDs, and verification tokens. This positions the attack as a particularly dangerous vector for supply chain compromises, where malicious code could be introduced into software projects and subsequently distributed to end users. They then create malicious extensions using these extracted credentials, effectively impersonating trusted publishers while injecting harmful code. The corresponding extension.js file contains JavaScript code that executes system commands when activated, such as launching the calculator application as a demonstration of arbitrary code execution capabilities.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 03 Jul 2025 03:10:16 +0000


Cyber News related to IDE Extensions Like VSCode Let Attackers Bypass Trust Checks and Malware on Developer Machines

CVE-2025-52882 - Claude Code is an agentic coding tool. Claude Code extensions in VSCode and forks (e.g., Cursor, Windsurf, and VSCodium) and JetBrains IDEs (e.g., IntelliJ, Pycharm, and Android Studio) are vulnerable to unauthorized websocket connections from an ...
1 week ago
VSCode extensions found downloading early-stage ransomware - It is notable that the extensions were uploaded onto the VSCode Marketplace on October 27, 2024 (ahban.cychelloworld) and February 17, 2025 (ahban.shiba), bypassing safety review processes and remaining on Microsoft's store for an extensive ...
3 months ago Bleepingcomputer.com
Zero-Trust Architecture in Modern Cybersecurity - Clearly, organizations need more robust cybersecurity protections in place, which is leading many to adopt a zero-trust architecture approach. Zero-trust flips conventional security on its head by shifting from an implicit trust model to one where ...
1 year ago Feeds.dzone.com
Malicious VSCode extensions infect Windows with cryptominers - Nine VSCode extensions on Microsoft's Visual Studio Code Marketplace pose as legitimate development tools while infecting users with the XMRig cryptominer to mine Ethereum and Monero. If you have installed any of the nine extensions mentioned in the ...
3 months ago Bleepingcomputer.com
VSCode extensions with 9 million installs pulled over security risks - Microsoft has removed two popular VSCode extensions, 'Material Theme – Free' and  'Material Theme Icons – Free,' from the Visual Studio Marketplace for allegedly containing malicious code. One of the researchers, Amit Assaraf, says ...
4 months ago Bleepingcomputer.com
IDE Extensions Like VSCode Let Attackers Bypass Trust Checks and Malware on Developer Machines - A critical security vulnerability has been discovered in popular Integrated Development Environments (IDEs) that allows malicious actors to bypass trust verification systems and execute code on developer machines while maintaining the appearance of ...
5 days ago Cybersecuritynews.com
Zero Trust Security Framework: Implementing Trust in Business - The Zero Trust security framework is an effective approach to enhancing security by challenging traditional notions of trust. Zero Trust Security represents a significant shift in the cybersecurity approach, challenging the conventional concept of ...
1 year ago Securityzap.com
Zero Trust 2025 - Emerging Trends Every Security Leader Needs to Know - Forward-thinking organizations are embedding Zero Trust principles into broader business strategies rather than treating them as isolated security initiatives. Security leaders must champion this integrated approach to Zero Trust implementation to ...
2 months ago Cybersecuritynews.com
Cyble Discovers Cyberattack Using VSCode For Remote Access - Cyble Research and Intelligence Lab (CRIL) researchers have uncovered a sophisticated campaign that starts with a suspicious .LNK file and uses Visual Studio Code (VSCode) to establish persistence and remote access – and installs the VSCode command ...
9 months ago Thecyberexpress.com
Top 10 Best Dynamic Malware Analysis Tools in 2025 - FireEye Malware AnalysisEnterprise-grade solution, zero-day detection, integration with threat intelligence, memory forensics.Enterprise-grade malware detection and forensicsPricing details not publicly available; contact for quote.Yes6. Detux ...
4 months ago Cybersecuritynews.com
How to Extract Malware Configurations in a Sandbox - The most sought-after source of these indicators is malware configurations. Malware Sandboxing Leader ANY.RUN handles the heavy lifting of phishing and malware analysis for SOC and DFIR teams and also helps 300,000 professionals use the platform to ...
1 year ago Gbhackers.com
Zero Trust Architecture - A Step-by-Step Guide for CISOs - With thoughtful leadership and strategic implementation, Zero Trust architecture can transform your organization’s security posture, providing protection that aligns with today’s distributed work environments and evolving threat ...
2 months ago Cybersecuritynews.com
Zero Trust Implementation - A CISO’s Essential Resource Guide - Enter Zero Trust: a security framework built on “never trust, always verify.” For Chief Information Security Officers (CISOs), implementing Zero Trust is not just a technical upgrade; it’s a strategic shift in how security is managed across the ...
2 months ago Cybersecuritynews.com
Types of Malware and How To Prevent Them - Malware is one of the biggest security threats to any type of technological device, and each type of malware uses unique tactics for successful invasions. Even if you've downloaded a VPN for internet browsing, our in-depth guide discusses the 14 ...
1 year ago Pandasecurity.com
Implementing Zero Trust and Mitigating Risk: ISC2 Courses to Support Your Development - PRESS RELEASE. Zero trust security is a proactive and robust approach to cybersecurity that addresses modern threats by continuously verifying and monitoring all network activities. While its implementation can be complex and resource-intensive, the ...
1 year ago Darkreading.com
How to Remove Malware + Viruses - Malware removal can seem daunting after your device is infected with a virus, but with a careful and rapid response, removing a virus or malware program can be easier than you think. We created a guide that explains exactly how to rid your Mac or PC ...
1 year ago Pandasecurity.com
Fake VPN Chrome extensions force-installed 1.5 million times - Three malicious Chrome extensions posing as VPN infected were downloaded 1.5 million times, acting as browser hijackers, cashback hack tools, and data stealers. According to ReasonLabs, which discovered the malicious extensions, they are spread via ...
1 year ago Bleepingcomputer.com
Integrate Modern Strategies for Zero Trust with Identity & Access Management (IAM) - The implementation of Zero Trust in identity and access management requires careful consideration of several critical elements that work together to create a comprehensive security framework. Leaders who approach Zero Trust as a strategic business ...
2 months ago Cybersecuritynews.com
Microsoft apologizes for removing VSCode extensions used by millions - Microsoft has reinstated the 'Material Theme – Free' and 'Material Theme Icons – Free' extensions on the Visual Studio Marketplace after finding that the obfuscated code they contained wasn't actually malicious. According to Astorino, the ...
3 months ago Bleepingcomputer.com
10 Best ZTNA Solutions (Zero Trust Network Access) in 2025 - Google BeyondCorp Enterprise delivers Zero Trust security through a cloud-native platform, enabling secure access to applications without VPNs. Check Point ZTNA is a leading Zero Trust solution designed for organizations seeking comprehensive, ...
3 hours ago Cybersecuritynews.com
WEF 2024 Report: Cybersecurity at the forefront, zero trust seen as critical for trust rebuilding - The best place for the World Economic Forum to achieve its key theme this year of rebuilding trust is to start with cybersecurity, cyber defenses, and cyber-resilience. Their latest global cybersecurity outlook 2024 insight report delivers insights ...
1 year ago Venturebeat.com
PixPirate: The Brazilian financial malware you can't see, part one - The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan malware that heavily utilizes anti-research techniques. Within IBM Trusteer, we saw several different ...
1 year ago Securityintelligence.com
Schneier on Security - At the airport, I trusted ticket agents and maintenance engineers and everyone else who keeps airlines operating. We trust their intentions, and know that those intentions will inform their actions. We might not know someone personally, or know their ...
1 year ago Schneier.com
ACM will no longer cross sign certificates with Starfield Class 2 starting August 2024 - AWS Certificate Manager is a managed service that you can use to provision, manage, and deploy public and private TLS certificates for use with Elastic Load Balancing, Amazon CloudFront, Amazon API Gateway, and other integrated AWS services. Starting ...
1 year ago Aws.amazon.com
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware - Password stealing malware is again rising with several attacks making the news cycle in recent months. A new password-stealing malware named Ov3r Stealer was discovered on Facebook Ads, spreading by way of fake job opportunities. Further analysis ...
1 year ago Cybersecurity-insiders.com

Latest Cyber News


Cyber Trends (last 7 days)