Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Microsoft präsentiert neue Sicherheitsstrategie

December 15, 2025

Strengthening Cyber Resilience: Updated CISA Framework for IT and OT Environments

December 15, 2025

New Gentlemen Ransomware Breaches and Encrypts Corporate Data

December 15, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Malicious VS Code Extension with Built-In Ransomware Capabilities Detected
Cybercrime and Ransomware

Malicious VS Code Extension with Built-In Ransomware Capabilities Detected

Staff WriterBy Staff WriterNovember 7, 2025No Comments4 Mins Read1 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Essential Insights

  1. Researchers detected a malicious VS Code extension, “susvsex,” created with AI assistance, that automatically zips, encrypts, and exfiltrates files, with its code also containing command-and-control via private GitHub repositories.
  2. The extension’s malicious functionalities, including decryption tools and C2 server code, are openly visible, indicating it is vibe-coded malware that could be easily updated or controlled remotely.
  3. Simultaneously, 17 npm packages disguised as legitimate SDKs were found to secretly drop the Vidar Stealer, using postinstall scripts to download and execute malware, marking a first for distribution of Vidar via npm.
  4. Such supply chain attacks highlight the need for developers to exercise caution, reviewing package sources, changelogs, and watching for suspicious behaviors like typosquatting to mitigate risks from malicious open-source code.

Underlying Problem

Cybersecurity experts have uncovered a concerning case involving a malicious Visual Studio Code extension named “susvsex,” which was uploaded on November 5, 2025, by a user with the alias “suspublisher18.” Created with the aid of artificial intelligence—referred to as vibe-coded—the extension blatantly reveals its malicious intent by automatically zipping, encrypting, and exfiltrating files from designated directories upon installation or launch of VS Code, then sending the data to a remote server. It also functions as a command-and-control (C2) agent by polling a private GitHub repository for instructions, which it then executes and reports back, all while embedding sensitive access tokens. The extension’s creator intentionally left dev notes and scripts that accidentally included decryption and C2 server keys, heightening the risk of misuse. Microsoft swiftly responded, removing the extension from its marketplace, but the incident underscores the evolving sophistication of AI-assisted malware and the pressing need for vigilant scrutiny of third-party extensions.

Simultaneously, Datadog Security Labs traced a more insidious supply chain attack involving 17 npm packages masquerading as legitimate development tools but designed to secretly deploy Vidar, a notorious info-stealer. These packages, uploaded by two now-banned accounts, relied on a postinstall script to download and execute malware from an external server, often using hardcoded accounts for further command and control. The infection chain leverages common package management workflows, making it particularly stealthy and difficult to detect, especially since hundreds of developers might have inadvertently installed these malicious packages before their takedown. Both cases highlight ongoing vulnerabilities in software distribution ecosystems and stress the importance of meticulous vetting and security hygiene by developers to thwart such sophisticated, automated cyber threats.

Risk Summary

The issue of a “Vibe-Coded Malicious VS Code Extension with Built-In Ransomware Capabilities” can significantly threaten any business that relies on software development or code management, as such malicious extensions, disguised as legitimate tools, have the potential to silently infiltrate systems and execute ransomware attacks, effectively locking critical data and disrupting operations. Once compromised, a business may face catastrophic financial losses, data breaches, operational downtimes, and damage to its reputation, with recovery costs often soaring into the millions. This stealthy threat underscores the importance of rigorous security protocols, vigilant monitoring of third-party integrations, and proactive vulnerability management to prevent malicious code from quietly embedding itself into core business processes—making this issue a looming danger to organizational stability and financial health.

Possible Remediation Steps

Rapid response to cyber threats is crucial in minimizing potential damage, especially when dealing with vulnerabilities like a malicious VS Code extension embedded with ransomware capabilities. Timely remediation can prevent data loss, protect sensitive information, and reduce operational disruptions.

Containment Measures

  • Immediately disable or remove the compromised extension from all affected systems.
  • Isolate affected devices from the network to prevent further spread.

Incident Analysis

  • Conduct thorough investigation to understand the scope and impact of the malware.
  • Identify affected files, systems, and users involved.

Eradication Steps

  • Remove the malicious extension completely from the system.
  • Use reputable anti-malware tools to scan and disinfect affected environments.

Recovery Procedures

  • Restore systems from clean backups, validating data integrity before resumption.
  • Patch and update visual code environments to ensure all security vulnerabilities are addressed.

Preventive Actions

  • Implement strict extension vetting processes before deployment.
  • Apply least privilege principles to limit extension capabilities.
  • Develop and enforce security policies for code editor environments.

Communication & Documentation

  • Notify relevant stakeholders and users about the incident.
  • Document the response process and lessons learned for future reference.

Continue Your Cyber Journey

Stay informed on the latest Threat Intelligence and Cyberattacks.

Explore engineering-led approaches to digital security at IEEE Cybersecurity.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1cyberattack-v1-multisource

CISO Update computer security cyber attacks cyber news cyber risk cyber security news cyber security news today cyber security updates cyber updates cybercrime Cybersecurity data breach hacker news hacking news how to hack information security MX1 network security ransomware malware risk management software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMidnight Ransomware Flaws Unlock Fast File Recovery
Next Article MorganFranklin Cyber Expands Reach with Lynx Technology Partners Acquisition
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Microsoft präsentiert neue Sicherheitsstrategie

December 15, 2025

Strengthening Cyber Resilience: Updated CISA Framework for IT and OT Environments

December 15, 2025

New Gentlemen Ransomware Breaches and Encrypts Corporate Data

December 15, 2025

Comments are closed.

Latest Posts

Microsoft präsentiert neue Sicherheitsstrategie

December 15, 20250 Views

Strengthening Cyber Resilience: Updated CISA Framework for IT and OT Environments

December 15, 20250 Views

New Gentlemen Ransomware Breaches and Encrypts Corporate Data

December 15, 20250 Views

Top XDR-Tools für maximale Sicherheit

December 15, 20250 Views
Don't Miss

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Microsoft präsentiert neue Sicherheitsstrategie
  • Strengthening Cyber Resilience: Updated CISA Framework for IT and OT Environments
  • New Gentlemen Ransomware Breaches and Encrypts Corporate Data
  • Top XDR-Tools für maximale Sicherheit
  • Dallas: Corinium CISO 2025 Conference

Recent Comments

No comments to show.
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Microsoft präsentiert neue Sicherheitsstrategie

December 15, 2025

Strengthening Cyber Resilience: Updated CISA Framework for IT and OT Environments

December 15, 2025

New Gentlemen Ransomware Breaches and Encrypts Corporate Data

December 15, 2025
Most Popular

Cyberattack Cripples 34 Devices in Telecoms Using LinkedIn Lures & MINIBIKE Malware

September 19, 20259 Views

Critical Linux Flaw Under Attack by Ransomware Gangs

November 1, 20258 Views

Scania Confirms Data Breach Amid Extortion Attempt

June 17, 20258 Views

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.