VS Code Marketplace Flaw Allows Reuse of Deleted Extension Names
Summary
Hide β²
Show βΌ
A flaw in the Visual Studio Code Marketplace allows threat actors, notably WhiteCobra, to republish deleted extensions under the same names. This vulnerability was discovered after identifying a malicious extension named "ahbanC.shiba" that mimicked previously flagged extensions. The flaw enables attackers to reuse names of removed extensions, posing a risk to software supply chain security. The malicious extensions act as downloaders, retrieving a PowerShell payload that encrypts files and demands Shiba Inu tokens. This issue highlights the need for secure development practices and proactive monitoring of software repositories. WhiteCobra has targeted VSCode, Cursor, and Windsurf users by planting 24 malicious extensions in the Visual Studio marketplace and the Open VSX registry. The campaign is ongoing as the threat actor continuously uploads new malicious code to replace the extensions that are removed. The group is responsible for the $500,000 crypto-theft in July, through a fake extension for the Cursor editor.
Timeline
-
13.09.2025 17:00 π° 1 articles Β· β± 4d ago
WhiteCobra's Ongoing Campaign Targets Multiple Code Editors
The threat actor WhiteCobra has targeted VSCode, Cursor, and Windsurf users by planting 24 malicious extensions in the Visual Studio marketplace and the Open VSX registry. The campaign is ongoing as the threat actor continuously uploads new malicious code to replace the extensions that are removed. The malicious extensions use obfuscated code to unpack a payload designed for data theft and exfiltration. The payload is platform-specific, with available versions for Windows, macOS on ARM, and macOS on Intel. On Windows, a PowerShell script executes a Python script that runs the LummaStealer malware. On macOS, the payload is a malicious Mach-O binary that loads an unknown malware family. WhiteCobra operates in an organized fashion, defining revenue targets, providing command-and-control infrastructure setup guides, and describing social engineering and marketing promotion strategies. The group is capable of deploying a new campaign in less than three hours.
Show sources
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
-
28.08.2025 20:10 π° 2 articles Β· β± 20d ago
VS Code Marketplace Flaw Allows Reuse of Deleted Extension Names
A flaw in the Visual Studio Code Marketplace allows threat actors, notably WhiteCobra, to republish deleted extensions under the same names. This vulnerability was discovered after identifying a malicious extension named "ahbanC.shiba" that mimicked previously flagged extensions. The flaw enables attackers to reuse names of removed extensions, posing a risk to software supply chain security. The malicious extensions act as downloaders, retrieving a PowerShell payload that encrypts files and demands Shiba Inu tokens. This issue highlights the need for secure development practices and proactive monitoring of software repositories. WhiteCobra has targeted VSCode, Cursor, and Windsurf users by planting 24 malicious extensions in the Visual Studio marketplace and the Open VSX registry. The campaign is ongoing as the threat actor continuously uploads new malicious code to replace the extensions that are removed. The group is responsible for the $500,000 crypto-theft in July, through a fake extension for the Cursor editor.
Show sources
- Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names β thehackernews.com β 28.08.2025 20:10
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
Information Snippets
-
The flaw allows threat actors to republish deleted extensions under the same names in the Visual Studio Code Marketplace.
First reported: 28.08.2025 20:10π° 2 sources, 2 articlesShow sources
- Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names β thehackernews.com β 28.08.2025 20:10
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
-
The malicious extension "ahbanC.shiba" mimics previously flagged extensions "ahban.shiba" and "ahban.cychelloworld".
First reported: 28.08.2025 20:10π° 1 source, 1 articleShow sources
- Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names β thehackernews.com β 28.08.2025 20:10
-
The extensions function as downloaders, retrieving a PowerShell payload that encrypts files and demands Shiba Inu tokens.
First reported: 28.08.2025 20:10π° 2 sources, 2 articlesShow sources
- Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names β thehackernews.com β 28.08.2025 20:10
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
-
The flaw exists because the Marketplace allows the reuse of names of deleted extensions, but not unpublishing.
First reported: 28.08.2025 20:10π° 2 sources, 2 articlesShow sources
- Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names β thehackernews.com β 28.08.2025 20:10
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
-
This behavior is similar to the Python Package Index (PyPI) repository, where deleted package names can be reused.
First reported: 28.08.2025 20:10π° 1 source, 1 articleShow sources
- Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names β thehackernews.com β 28.08.2025 20:10
-
The flaw poses a significant risk to software supply chain security, as seen in leaked Black Basta chat logs.
First reported: 28.08.2025 20:10π° 1 source, 1 articleShow sources
- Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names β thehackernews.com β 28.08.2025 20:10
-
The discovery of this loophole exposes a new threat where any removed extension's name can be reused by anyone.
First reported: 28.08.2025 20:10π° 1 source, 1 articleShow sources
- Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names β thehackernews.com β 28.08.2025 20:10
-
The malicious extensions use obfuscated code to unpack a Python payload designed for data theft and exfiltration.
First reported: 28.08.2025 20:10π° 1 source, 1 articleShow sources
- Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names β thehackernews.com β 28.08.2025 20:10
-
The threat actor WhiteCobra has targeted VSCode, Cursor, and Windsurf users by planting 24 malicious extensions in the Visual Studio marketplace and the Open VSX registry.
First reported: 13.09.2025 17:00π° 1 source, 1 articleShow sources
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
-
The campaign is ongoing as the threat actor continuously uploads new malicious code to replace the extensions that are removed.
First reported: 13.09.2025 17:00π° 1 source, 1 articleShow sources
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
-
WhiteCobra is the same group responsible for the $500,000 crypto-theft in July, through a fake extension for the Cursor editor.
First reported: 13.09.2025 17:00π° 1 source, 1 articleShow sources
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
-
The malicious extensions use obfuscated code to unpack a payload designed for data theft and exfiltration.
First reported: 13.09.2025 17:00π° 1 source, 1 articleShow sources
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
-
The payload is platform-specific, with available versions for Windows, macOS on ARM, and macOS on Intel.
First reported: 13.09.2025 17:00π° 1 source, 1 articleShow sources
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
-
On Windows, a PowerShell script executes a Python script that executes shellcode to run the LummaStealer malware.
First reported: 13.09.2025 17:00π° 1 source, 1 articleShow sources
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
-
On macOS, the payload is a malicious Mach-O binary that executes locally to load an unknown malware family.
First reported: 13.09.2025 17:00π° 1 source, 1 articleShow sources
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
-
WhiteCobra defines revenue targets between $10,000 and $500,000, provides a command-and-control (C2) infrastructure setup guides, and describes social engineering and marketing promotion strategies.
First reported: 13.09.2025 17:00π° 1 source, 1 articleShow sources
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
-
WhiteCobra is capable of deploying a new campaign in less than three hours.
First reported: 13.09.2025 17:00π° 1 source, 1 articleShow sources
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
-
Better verification mechanisms are necessary to distinguish between malicious extensions and legitimate ones available in repositories.
First reported: 13.09.2025 17:00π° 1 source, 1 articleShow sources
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
-
General recommendations include checking for impersonation and typosquatting attempts, using only known projects with a good trust record, and being suspicious of new projects that gathered a large number of downloads and positive reviews in a short amount of time.
First reported: 13.09.2025 17:00π° 1 source, 1 articleShow sources
- 'WhiteCobra' floods VSCode market with crypto-stealing extensions β www.bleepingcomputer.com β 13.09.2025 17:00
Similar Happenings
FileFix Attack Using Steganography to Deploy StealC Infostealer
A new FileFix social engineering campaign impersonates Meta account suspension warnings to trick users into installing the StealC infostealer malware. The attack uses steganography to hide malicious scripts and executables within a JPG image. The campaign targets various credentials, cryptocurrency wallets, and cloud services. The FileFix technique abuses the File Explorer address bar to execute PowerShell commands, bypassing traditional detection methods. The attack was discovered by Acronis and observed over a two-week period, with multiple variants using different payloads and domains. The StealC malware aims to steal sensitive information from infected devices, including browser credentials, messaging app data, and cryptocurrency wallets. The FileFix technique was created by red team researcher mr.d0x and has been previously used by the Interlock ransomware gang. The attack uses a multilingual phishing site to trick users into copying and pasting a malicious command into the File Explorer address bar. The campaign abuses Bitbucket repositories to host malicious components, leveraging trust in the platform to bypass detection. The FileFix campaign is the most widespread, customized, and sophisticated to date, targeting users in over 16 countries. The phishing site has been translated into at least 16 different languages. The attack chain involves a phishing email impersonating Facebook security, warning users of account suspension. The attack uses AI-generated images in the steganography process. The FileFix technique is more elegant and less suspicious than ClickFix, using File Explorer instead of the Run dialog. The FileFix attack offers a broader range of high-value targets due to its use of File Explorer. Security researcher Eliad Kimhy predicts an increase in FileFix attacks in the near future. The FileFix attack involves a fake Cloudflare Turnstile verification page that redirects users to a Windows File Explorer search query. The attack uses a Windows shortcut LNK file disguised as a PDF to initiate the infection chain. The LNK file downloads a legitimate AnyDesk installer and a malicious MSI package that installs MetaStealer. The MSI package contains a DLL and a CAB archive with malicious files, including a MetaStealer dropper. The MetaStealer dropper is protected with Private EXE Protector and is designed to steal cryptocurrency wallets. The attack leverages the Windows search protocol to redirect users to an attacker-controlled SMB share. The FileFix attack has evolved to include a more sophisticated infection chain that bypasses traditional detection methods. The attack uses a multi-stage process involving Windows File Explorer, a fake PDF lure, and an MSI package to deploy MetaStealer. The FileFix attack has been observed to use a combination of social engineering and advanced technical techniques to evade detection.
Supply Chain Attack Targeting npm Registry Compromises 40 Packages
A supply chain attack targeting the npm registry has compromised over 700 packages maintained by multiple developers. The attack uses a malicious script (bundle.js) to steal credentials from developer machines. The compromised packages include various npm modules used in different projects. The attack is capable of targeting both Windows and Linux systems. The malicious script scans for secrets using TruffleHog's credential scanner and transmits them to an external server controlled by the attackers. Developers are advised to audit their environments and rotate credentials if the affected packages are present.
Active exploitation of CVE-2025-5086 in DELMIA Apriso
CVE-2025-5086, a critical deserialization flaw in Dassault Systèmes DELMIA Apriso Manufacturing Operations Management (MOM) software, is being actively exploited. The vulnerability, with a CVSS score of 9.0, affects versions from Release 2020 through Release 2025. Exploitation attempts have been observed, targeting the /apriso/WebServices/FlexNetOperationsService.svc/Invoke endpoint with a Base64-encoded payload. The payload decodes to a GZIP-compressed Windows executable that deploys a malicious program designed to spy on user activities. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the flaw to its Known Exploited Vulnerabilities (KEV) catalog, advising Federal Civilian Executive Branch (FCEB) agencies to apply updates by October 2, 2025. The malware, identified as Trojan.MSIL.Zapchast.gen, captures keyboard input, takes screenshots, and gathers information about active applications. This information is then sent to the attacker via various means, including email, FTP, and HTTP. The exploit involves sending a malicious SOAP request to vulnerable endpoints. The malicious requests were observed originating from the IP 156.244.33[.]162.
EvilAI Malware Campaign Targets Multiple Sectors Globally
A threat actor, tracked as EvilAI, is using AI-enhanced malware disguised as legitimate productivity and AI-enhanced apps to target organizations in various sectors worldwide. The malware is spread rapidly across multiple regions, including the US, India, the UK, Germany, France, and Brazil. The malware features realistic functionality and stealthy payload delivery, making it difficult to detect with traditional antivirus tools. The campaign uses digital signatures from newly registered entities to lend authenticity to the malicious apps. Once installed, the malware performs extensive reconnaissance, disables security products, and sets the stage for future exploit activities. The malware is likely being used by an initial access broker (IAB) to gain initial access and establish persistence.
Microsoft's RC4 Encryption Vulnerability Exploited in Black Basta Ransomware Attack on Ascension
U.S. Senator Ron Wyden has called for an FTC investigation into Microsoft's cybersecurity practices, citing the company's support for RC4 encryption and insecure default settings that facilitated a ransomware attack on the Ascension healthcare network. The attack, attributed to the Black Basta ransomware group, compromised nearly 5.6 million individuals' personal and medical information. The breach occurred when a contractor's system was infected via a malicious link on Microsoft's Bing search engine. Attackers exploited insecure default settings and Kerberoasting techniques to gain elevated access to Ascension's network. Microsoft has acknowledged the vulnerabilities and plans to deprecate RC4 support in future updates. Wyden has criticized Microsoft for not clearly warning customers about the risks associated with RC4 encryption and for not taking decisive action to mitigate security risks.