Costa Rica Post

Pura Vida, Every Day
Tuesday, Mar 03, 2026

Hackers Are Hiding Malware in Open-Source Tools and IDE Extensions

The common belief that “open source is safe because everyone can inspect the code” is misleading. In reality, most open-source projects include add-ons and components that are not open source at all — and these hidden parts can easily contain spyware, malware, and viruses. Once installed, they can take over both the user’s computer and the servers running the so-called open-source code, giving hackers full control to do whatever they want.

A newly uncovered cyberattack—one of the most sophisticated developer-focused campaigns seen in recent years—is weaponizing the daily workflow of software engineers. 

Security companies have revealed a malicious operation in which attackers insert stealthy malware into seemingly harmless extensions and open-source tools used by tens of thousands of developers worldwide. 

These extensions appear completely legitimate, yet silently exfiltrate highly sensitive data such as passwords, Wi-Fi access credentials, authentication tokens, clipboard contents, and even live screenshots taken directly from developers’ machines.


Compromised VS Code Extensions: “Bitcoin Black” and “Codo AI”

Two Visual Studio Code extensions were confirmed to contain embedded malicious components: the Bitcoin Black theme and an AI assistant tool called Codo AI. Both extensions looked fully legitimate on the marketplace and performed their advertised functions, which helped them evade suspicion and achieve wide adoption.

Once installed, the extensions deployed an additional malicious payload that continuously harvested data from infected devices. The threat actors were not content with collecting passwords alone. The malware captured real-time screenshots of developers’ screens—revealing source code, Slack discussions, credentials, internal documentation, and confidential project directories.

This level of visibility allows attackers to map entire workflows, understand sensitive architectures, and target organizations with precision.


The Attack Technique: DLL Hijacking as a Delivery Vehicle

The operation relied on an advanced method known as DLL hijacking, which abuses the way legitimate software loads system libraries.

The attackers downloaded a real, benign screenshot tool (Lightshot) onto the victim’s machine, pairing it with a malicious DLL that carried the same filename as the tool’s expected library. When Lightshot launched, it automatically loaded the attacker’s counterfeit DLL. This triggered the malware’s execution without raising suspicion.

Security researchers found that the malware collected:

  • Continuous screenshots and clipboard data

  • Wi-Fi passwords and saved wireless credentials

  • Browser cookies, authentication tokens, and active sessions (via Chrome and Edge in headless mode)

  • Information about installed software, running processes, and development tools

Koi Security reports that the attackers have been iterating and improving the operation, increasingly using “clean” and innocuous-looking scripts to blend in with normal developer activity.


The Campaign Is Spreading Beyond VS Code

While the first findings emerged in VS Code, similar malicious injections are now appearing across the broader open-source ecosystem:

  • npm and Go: Malware packages imitating the names of popular, trusted libraries

  • Rust: A library called finch-rust masqueraded as a scientific computation tool, but instead loaded an additional malware component called sha-rust

This reflects a direct attack on the software supply chain—the trust mechanism developers rely on when importing packages, extensions, or dependencies. By compromising tools that sit at the heart of software development, attackers gain privileged access to entire organizations.


Why This Threat Is So Dangerous

A single developer installing one benign-looking extension can unknowingly trigger a breach across the entire company:

  • Theft of core, proprietary source code

  • Takeover of GitHub and other cloud development accounts

  • Infection of CI/CD pipelines and build environments

  • Exposure of sensitive customer data, credentials, and internal architecture

Because development environments are privileged by design—holding secrets, tokens, SSH keys, and code—the blast radius of compromise is enormous.

Traditional static code scanning is insufficient for detecting these attacks. The extensions themselves often appear legitimate or include harmless code alongside hidden payloads. What is required is real-time behavioral monitoringcapable of flagging anomalous actions—such as a theme extension attempting to access stored passwords.


Recommended Security Measures for Developers and Organizations

To reduce exposure, cybersecurity firms recommend the following defensive steps:

  1. Enable multi-factor authentication on all development accounts, including GitHub, GitLab, cloud providers, and CI/CD tools.

  2. Verify the identity and reputation of extension publishers before installation.

  3. Avoid anonymous, poorly reviewed, or unknown plugins—even if they appear harmless.

  4. Adopt security tools that include behavioral detection, not only static scanning.

  5. Treat all AI-powered development tools with caution, especially those requesting elevated system permissions.

  6. Conduct regular audits of development environments, including browser sessions, secrets, stored tokens, and installed extensions.


This attack marks a turning point in developer-focused cybercrime. 

By targeting the very tools that developers rely on daily, attackers gain unprecedented access to the global software ecosystem. The findings underscore the urgent need for stronger supply-chain security, rigorous extension vetting, and behavioral monitoring to defend the world’s most sensitive development workflows.

Newsletter

Related Articles

0:00
0:00
Close
Mexico President Sheinbaum:
New York Braces for Major Snowstorm With Up to 18 Inches Forecast and Blizzard Warnings Issued
Mexican Military Kills CJNG Leader Nemesio Oseguera Cervantes as Violence Erupts Across Jalisco
US Supreme Court Voids Trump’s Emergency Tariff Plan, Reshaping Trade Power and Fiscal Risk
Carnival transforms Rio de Janeiro's streets with samba rhythms and lively celebrations
Cuba adopts electric tricycles for transport amid fuel shortages
Pentagon Reviews Anthropic Partnership After Claude AI Reportedly Used in Operation Targeting Nicolás Maduro
OpenAI and DeepCent Superintelligence Race: Artificial General Intelligence and AI Agents as a National Security Arms Race
Investigation Launched at Winter Olympics Over Ski Jumpers Injecting Hyaluronic Acid
Cuba Warns It Has Only Weeks of Oil Remaining as US Pressure Tightens
The AI Hiring Doom Loop — Algorithmic Recruiting Filters Out Top Talent and Rewards Average or Fake Candidates
U.S. winter storm triggers 13,000-plus flight cancellations and 160,000 power outages
Gold Jumps More Than 8% in a Week as the Dollar Slides Amid Greenland Tariff Dispute
Greenland, Gaza, and Global Leverage: Today’s 10 Power Stories Shaping Markets and Security
America’s Venezuela Oil Grip Meets China’s Demand: Market Power, Legal Shockwaves, and the New Rules of Energy Leverage
Cybercrime, Inc.: When Crime Becomes an Economy. How the World Accidentally Built a Twenty-Trillion-Dollar Criminal Economy
There is no sovereign immunity for poisoning millions with drugs.
President Trump Says United States Will Administer Venezuela Until a Secure Leadership Transition
Delta Force Identified as Unit Behind U.S. Operation That Captured Venezuela’s President
Trump Announces U.S. Large-Scale Strike on Venezuela, Declares President Maduro and Wife Captured
The Pilot Barricaded Himself in the Cockpit and Refused to Take Off: "We Are Not Leaving Until I Receive My Salary"
Hackers Are Hiding Malware in Open-Source Tools and IDE Extensions
Families Accuse OpenAI of Enabling ‘AI-Driven Delusions’ After Multiple Suicides
Maduro Tightens Security Measures as U.S. Strike Threat Intensifies
U.S. Issues Alert Declaring Venezuelan Airspace a Hazard Due to Escalating Security Conditions
A Decade of Innovation Stagnation at Apple: The Cook Era Critique
AI Researchers Claim Human-Level General Intelligence Is Already Here
Nancy Pelosi Finally Announces She Will Not Seek Re-Election, Signalling End of Long Congressional Career
White House Refutes Reports That US Targeting Military Sites in Venezuela
Hurricane Melissa Strikes Cuba After Devastating Jamaica With Record Winds
U.S. Targets Maritime Narco-Routes While Border Pressure to Mexico Remains Limited
Argentina’s Markets Surge as Milei’s Party Secures Major Win
U.S. Treasury Sanctions Colombia’s President Gustavo Petro over Drug-Trafficking Allegations
‘I Am Not Done’: Kamala Harris Signals Possible 2028 White House Run
Ecuadorian President Daniel Noboa Alleges Poison Plot via Chocolate and Jam
Trump Accuses Colombia’s President of Drug-Leadership and Announces End to US Aid
"The Tsunami Is Coming, and It’s Massive": The World’s Richest Man Unveils a New AI Vision
U.S. Treasury Mobilises New $20 Billion Debt Facility to Stabilise Argentina
Trump Stands Firm in Shutdown Showdown and Declares War on Drug Cartels — Turning Crisis into Opportunity
FBI Strikes Deep in Maduro’s Financial Web with Bold Money-Laundering Indictments
Sean ‘Diddy’ Combs Sentenced to Fifty Months in Prison Following Prostitution Conviction
New World Screwworm Creeps Within Seventy Miles of U.S. Border, Threatening Cattle Sector
Colombian President Petro Vows to Mobilize Volunteers for Gaza and Joins List of Fighters
U.S. Signals ‘Large and Forceful’ Support for Argentina Amid Market Turmoil
New Eye Drops Show Promise in Replacing Reading Glasses for Presbyopia
Trump Orders Third Lethal Strike on Drug-Trafficking Vessel as U.S. Expands Maritime Counter-Narcotics Operations
US Launches New Pilot Program to Accelerate eVTOL Air Taxi Deployment
New OpenAI Study Finds Majority of ChatGPT Use Is Personal, Not Professional
Actor, director, environmentalist Robert Redford dies at 89
Florida Hospital Welcomes Its Largest-Ever Baby: Annan, Nearly Fourteen Pounds at Birth
×