Malicious VS Code Extensions Infect Developers With Infostealers and Session Hijackers

by | Dec 9, 2025 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Two malicious Visual Studio Code extensions uploaded to Microsoft’s official marketplace have been found deploying information-stealing malware capable of taking screenshots, exfiltrating credentials, stealing crypto wallets, and hijacking browser sessions.

The extensions — Bitcoin Black and Codo AI — were published under the developer name “BigBlack” and masqueraded as a harmless color theme and an AI coding assistant.

CodoAI on VSCode MarketCodo AI on VSCode Market
Source: BleepingComputer.com

While download counts were low (Codo AI <30 installs, Bitcoin Black only 1), their presence on Microsoft’s trusted ecosystem highlights a growing supply-chain threat aimed directly at developers.


How the attack works

1. Malicious activation on every VSCode event

Security researchers at Koi Security discovered that Bitcoin Black used the "*" activation event — triggering code execution on every action inside VS Code.

Even worse, it had the ability to run PowerShell, something no theme should ever require.

2. Silent payload delivery

Early versions downloaded a password-protected payload via PowerShell, briefly flashing a visible window.

Newer variants replaced this with a hidden batch script (bat.sh) using curl to fetch:

  • a legitimate Lightshot screenshot tool executable
  • a malicious DLL that gets loaded through DLL hijacking

The malicious payload then launches as runtime.exe.

Malicious payload from bat.shMalicious payload from bat.sh
Source: Koi Security

3. Infostealer with broad capabilities

The malicious DLL (flagged by 29/72 AV engines on VirusTotal) creates a storage folder:

%APPDATA%\Local\Evelyn

It then exfiltrates a wide range of sensitive information:

  • Screenshots
  • Clipboard data
  • WiFi credentials
  • System & process information
  • Installed programs
  • Browser cookies & session data
  • Crypto wallet files (MetaMask, Phantom, Exodus, etc.)

4. Browser session hijacking

To steal cookies and active sessions, the malware launches Chrome and Edge in headless mode, enabling it to dump authentication cookies and impersonate the user.

This allows attackers to bypass MFA-protected sessions in some cases.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses



Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Codo AI: A dual-use lure

Codo AI actually includes working AI functionality via ChatGPT/DeepSeek, making it appear legitimate.

However, it embeds the same malicious component as Bitcoin Black, delivering the Lightshot + DLL pair and running the infostealer silently in the background.

This blend of functionality + malware is becoming more common in supply-chain attacks, as it hides malicious intent behind a “useful” extension.


Microsoft response

A Microsoft spokesperson confirmed to BleepingComputer that both malicious extensions have been removed from the VS Code Marketplace as of December 9.

However, similar supply-chain attacks have been seen before — most notably Glassworm, which pushed malicious extensions across VSCode, OpenVSX, and GitHub-linked extension feeds.




Developer risk & recommendations

Because VS Code extensions execute locally with developer-level privileges, a malicious plugin effectively becomes a high-trust backdoor.

To reduce exposure:

  • Install only from verified, reputable publishers
  • Review extension code or permissions before installation
  • Disable "*" activation events unless absolutely required
  • Monitor for unexpected use of PowerShell, curl, or new executables
  • Regularly audit extensions across development teams

Given developers often hold cloud credentials, SSH keys, GitHub tokens, and CI/CD secrets, compromising a single workstation can cascade into full supply-chain compromise.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Sources: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This