Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Buhlmann Group Faces Devastating Ransomware Attack

February 5, 2026

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

February 5, 2026

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » VS Code Flaw Lets Attackers Repost Deleted Extensions Under Same Names
Cybercrime and Ransomware

VS Code Flaw Lets Attackers Repost Deleted Extensions Under Same Names

Staff WriterBy Staff WriterAugust 28, 2025No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Essential Insights

  1. Researchers uncovered a security loophole in the Visual Studio Code Marketplace allowing malicious extensions to reuse names of previously deleted ones, potentially leading to supply chain attacks.
  2. Threat actors are exploiting this by re-uploading extensions with similar or identical names, which can encrypt files and demand ransoms, mimicking earlier malicious activities.
  3. Unlike PyPI, where malicious package names are protected, Visual Studio Code does not prevent reuse of extension names post-deletion, enabling malicious entities to impersonate legitimate extensions easily.
  4. The discovery emphasizes the urgent need for secure development practices and proactive ecosystem monitoring, especially as open-source repositories face increasing targeted attacks like typosquatting and obfuscation.

What’s the Problem?

Cybersecurity researchers have uncovered a vulnerability within the Visual Studio Code Marketplace that allows malicious actors to reuse the names of extensions once they have been removed, creating a significant security concern. This loophole emerged because, unlike official documentation mandates that extension IDs be unique, the marketplace’s system permits the reuse of extension names after their removal—something previously observed in the Python Package Index (PyPI). Threat actors exploit this flaw to upload malicious extensions, such as “ahbanC.shiba,” which serve as downloaders delivering harmful PowerShell payloads that encrypt files and demand cryptocurrency tokens, potentially leading to ransomware infections. These malicious activities are compounded by findings from leaked chats suggesting ongoing development of these payloads, highlighting the risk to developers and organizations relying on open-source registries. Security researcher Lucija Valentić emphasized that this loophole could enable the reuse of names from legitimate, popular extensions, increasing the risk of impersonation and attack.

This discovery coincides with other supply chain vulnerabilities, including the identification of multiple malicious npm packages that conceal data-stealing malware capable of exfiltrating sensitive credentials and financial information by using obfuscated code layers. Experts warn that open-source repositories have become prime targets for sophisticated cyberattacks, as malicious actors manipulate naming conventions and deploy multi-layered malware to evade detection. The overarching message underscores an urgent need for organizations and developers to implement vigilant security measures—such as thorough automated scanning and strict supply chain monitoring—to defend against these emerging threats and safeguard their software ecosystems from malicious infiltration.

Security Implications

Cyber risks associated with open-source software ecosystems present significant threats to organizations by exploiting vulnerabilities such as reuse of malicious or removed extension names, as discovered in the Visual Studio Code Marketplace, where threat actors can repurpose names after extensions are deleted, facilitating the deployment of ransomware or data-stealing payloads. Such loopholes enable attackers to embed malware within seemingly legitimate or previously trusted repositories, potentially leading to catastrophic consequences like encrypted files, exfiltration of sensitive data, and financial theft. The infiltration tactics extend beyond VS Code to platforms like PyPI and npm, highlighting a systemic vulnerability that allows malicious actors to exploit reuse of package names and inject obfuscated, data-harvesting malicious code—posing severe operational and reputational risks for organizations. These emerging threats underscore the urgent need for rigorous supply chain security practices, continuous monitoring, and automated threat detection to prevent malicious code from contaminating development pipelines and to safeguard sensitive data from theft and extortion.

Possible Remediation Steps

Understanding the urgency of timely remediation is crucial when dealing with vulnerabilities like the VS Code flaw that allows malicious actors to republish deleted extensions under the same names. Such security gaps can lead to serious risks, including the spread of malicious code and compromised user environments, emphasizing the need for swift and effective responses.

Mitigation Strategies

  • Extension Validation: Implement strict checks to verify extension authenticity and source integrity before installation or updating.
  • Monitoring & Alerts: Establish continuous monitoring for unusual activity or republishing attempts associated with deleted extensions.
  • Revocation & Blacklisting: Quickly revoke and blacklist extensions known to be malicious or suspicious to prevent misuse.
  • Security Patches: Collaborate with the VS Code development team to develop and deploy patches that address the flaw directly.
  • User Education: Inform users about the risk and encourage cautious installation, especially concerning deleted or suspicious extensions.
  • Access Controls: Enhance platform access controls to restrict unauthorized re-publishing of extensions under the same names.
  • Timeout Mechanisms: Introduce delay periods before an extension name can be reused after deletion, preventing immediate re-publishing.
  • Version Management: Maintain clear and secure version histories to help identify unauthorized updates or replication attempts.
  • Audit Trails: Keep detailed logs of extension updates and deletions to facilitate investigation and accountability.
  • Policy Development: Develop and enforce policies that mitigate risks related to extension re-publishing and management.

Continue Your Cyber Journey

Discover cutting-edge developments in Emerging Tech and industry Insights.

Explore engineering-led approaches to digital security at IEEE Cybersecurity.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1

CISO Update computer security cyber attacks cyber news cyber security news cyber security news today cyber security updates cyber updates Cybersecurity data breach hacker news hacking news how to hack information security MX1 network security ransomware malware software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleIntroducing the Free 2025 Cybersecurity Awareness Kit!
Next Article Agile Defense Welcomes Edward Drolet as New VP
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Buhlmann Group Faces Devastating Ransomware Attack

February 5, 2026

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

February 5, 2026

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

Comments are closed.

Latest Posts

Buhlmann Group Faces Devastating Ransomware Attack

February 5, 2026

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

February 5, 2026

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

DragonForce Ransomware Strikes: Critical Business Data at Risk

February 5, 2026
Don't Miss

Buhlmann Group Faces Devastating Ransomware Attack

By Staff WriterFebruary 5, 2026

Quick Takeaways The Buhlmann Group was targeted by the notorious ransomware group Akira, which claims…

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

February 5, 2026

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Buhlmann Group Faces Devastating Ransomware Attack
  • Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses
  • Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems
  • Critical n8n Flaw CVE-2026-25049: Command Execution Risk via Malicious Workflows
  • DragonForce Ransomware Strikes: Critical Business Data at Risk
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Buhlmann Group Faces Devastating Ransomware Attack

February 5, 2026

Hackers Exploit Decade-Old Windows Flaw to Disable Modern EDR Defenses

February 5, 2026

Unlocking Hidden Power: Why Boards Should Care About Their ‘Boring’ Systems

February 5, 2026
Most Popular

Nokia Alerts Telecoms to Rising Stealth Attacks, DDoS Surge, and Cryptography Pressures

October 8, 20259 Views

Cyberattack Cripples 34 Devices in Telecoms Using LinkedIn Lures & MINIBIKE Malware

September 19, 20259 Views

Tonic Security Secures $7 Million to Transform Cyber Risk Reduction

July 28, 20259 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.