Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks
嗯,用户让我用中文总结这篇文章,控制在100字以内,而且不需要用“文章内容总结”这样的开头。好的,我先快速浏览一下文章内容。 文章主要讲的是VS Code扩展的安全问题。有超过100个扩展泄露了访问令牌,这些令牌可以被恶意利用来更新扩展,带来供应链风险。Wiz的研究人员发现了550多个秘密,包括云服务和数据库的密钥。微软已经撤销了泄露的令牌,并增加了扫描功能。同时,还有一个叫TigerJack的威胁者发布了多个恶意扩展,窃取源代码和加密货币。 我需要把这些关键点浓缩到100字以内。首先提到VS Code扩展的安全漏洞,泄露的访问令牌带来的风险。然后提到研究人员发现的秘密类型和数量。接着微软的应对措施。最后提到TigerJack发布的恶意扩展及其影响。 确保语言简洁明了,不使用复杂的术语。避免重复信息,只保留最重要的部分。 </think> 研究发现超过100个Visual Studio Code(VS Code)扩展泄露了访问令牌,可能导致恶意更新和供应链风险。研究人员发现了550多个秘密,包括云服务和数据库密钥。微软已撤销泄露令牌并增加扫描功能以阻止恶意扩展。同时,威胁者TigerJack发布了多个恶意扩展以窃取源代码和加密货币。 2025-10-15 14:16:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

VS Code Extensions

New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that could be exploited by bad actors to update the extensions, posing a critical software supply chain risk.

"A leaked VSCode Marketplace or Open VSX PAT [personal access token] allows an attacker to directly distribute a malicious extension update across the entire install base," Wiz security researcher Rami McCarthy said in a report shared with The Hacker News. "An attacker who discovered this issue would have been able to directly distribute malware to the cumulative 150,000 install base."

The cloud security firm noted in many cases publishers failed to account for the fact that VS Code extensions, while distributed as .vsix files, can be unzipped and inspected, exposing hard-coded secrets embedded into them.

In all, Wiz said it found over 550 validated secrets, distributed across more than 500 extensions from hundreds of distinct publishers. The 550 secrets have been found to fall under 67 distinct types of secrets, including -

  • AI provider secrets, such as those related to OpenAI, Gemini, Anthropic, XAI, DeepSeek, Hugging Face, and Perplexity
  • Cloud service provider secrets, such as those related to Amazon Web Services (AWS), Google Cloud, GitHub, Stripe, and Auth0
  • Database secrets, such as those related to MongoDB, PostgreSQL, and Supabase

Wiz also noted in its report that more than 100 extensions leaked VS Code Marketplace PATs, which accounted for over 85,000 installs. Another 30 extensions with a cumulative install base of no less than 100,000 have been found to Open VSX Access Tokens. A significant chunk of the flagged extensions are themes.

DFIR Retainer Services

With Open VSX also integrated into artificial intelligence (AI)-powered VS Code forks like Cursor and Windsurf, extensions that leak access tokens can significantly expand the attack surface.

In one instance, the company said it identified a VS Code Marketplace PAT that could have allowed for pushing targeted malware to the workforce of a $30 billion market cap Chinese mega corporation, indicating that the problem also extends to internal or vendor-specific extensions used by organizations.

Following responsible disclosure to Microsoft in late March and April 2025, the Windows maker has revoked the leaked PATs and announced it's adding secret scanning capabilities to block extensions with verified secrets and notify developers when secrets are detected.

VS Code users are advised to limit the number of installed extensions, scrutinize extensions prior to downloading them, and weigh the pros and cons of enabling auto-updates. Organizations are recommended to develop an extension inventory to better respond to reports of malicious extensions and consider a centralized allowlist for extensions.

"The issue highlights the continued risks of extensions and plugins, and supply chain security in general," Wiz said. "It continues to validate the impression that any package repository carries a high risk of mass secrets leakage."

TigerJack Targets VS Code Marketplace with Malicious Extensions

The development comes as Koi Security disclosed details of a threat actor codenamed TigerJack that's been attributed to publishing at least 11 legitimate-looking malicious VS Code extensions using various publisher accounts since early 2025 as part of a "coordinated, systematic" campaign.

"Operating under the identities ab-498, 498, and 498-00, Tiger-Jack has deployed a sophisticated arsenal: extensions that steal source code, mine cryptocurrency, and establish remote backdoors for complete system control," security researcher Tuval Admoni said.

Two of the malicious extensions – C++ Playground and HTTP Format – attracted over 17,000 downloads prior to their takedown. However, they continue to be available on Open VSX, with the threat actor also republishing the same malicious code on September 17, 2025, under new names on the VS Code Marketplace after removal.

What's notable about these extensions is that they deliver the promised functionality, which provides the perfect cover for their malicious activities to go unnoticed by unsuspecting developers who may have installed them.

Specifically, the C++ Playground extension has been found to capture keystrokes in almost real-time through a listener that's triggered after a 500-millisecond delay. The end goal is to steal C++ source code files. On the other hand, the HTTP Format extension harbors nefarious code to run the CoinIMP miner and stealthily mine cryptocurrency by abusing the system resources.

Three other extensions published by TigerJack under the alias "498," namely cppplayground, httpformat, and pythonformat, further escalate the risk by incorporating the ability to act as a backdoor by downloading and running arbitrary JavaScript from an external server ("ab498.pythonanywhere[.]com") every 20 minutes.

CIS Build Kits

"By checking for new instructions every 20 minutes and using eval() on remotely fetched code, TigerJack can dynamically push any malicious payload without updating the extension—stealing credentials and API keys, deploying ransomware, using compromised developer machines as entry points into corporate networks, injecting backdoors into your projects, or monitoring your activity in real-time," Admoni noted.

Koi Security also pointed out that most of these extensions started off as completely benign tools before the malicious modifications were introduced, a classic case of a Trojan horse approach. This offers several advantages, as it allows the threat actor to establish legitimacy and gain traction among users.

What's more, it can also deceive a developer who may have vetted the extension before installation, as the threat actor could push an update later on to compromise their environment.

In June 2025, Microsoft said it has a multi-step process in place to keep the VS Code marketplace free of malware. This includes an initial scan of all incoming packages for malicious run-time behavior in a sandbox environment, as well as rescanning and periodic marketplace-wide scans to "make sure everything stays safe."

That said, these security protections only apply to VS Code Marketplace, and not others like the Open VSX registry, meaning even if the malicious extension gets removed from Microsoft's platform, threat actors can easily migrate to less-secure alternatives.

"The fragmented security landscape across all marketplaces creates dangerous blind spots that sophisticated threat actors are already exploiting," the company said. "When security operates in silos, threats simply migrate between platforms while developers remain unknowingly exposed."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/10/over-100-vs-code-extensions-exposed.html
如有侵权请联系:admin#unsafe.sh