Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

European Commission Confirms Data Breach After AWS Account Hack

March 28, 2026

Cybertech Weekly: Top Highlights and Trends

March 27, 2026

European Commission Web Hosts Hit by Major Data Breach

March 27, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Malicious Crypto-Stealing VSCode Extensions Resurface on OpenVSX
Cybercrime and Ransomware

Malicious Crypto-Stealing VSCode Extensions Resurface on OpenVSX

Staff WriterBy Staff WriterOctober 14, 2025No Comments4 Mins Read4 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Top Highlights

  1. TigerJack, a malicious threat actor, targets VSCode developers with extensions designed to steal cryptocurrency and install backdoors, operating on both Microsoft’s marketplace and OpenVSX, an open-source alternative.
  2. The group reuses malicious extensions like C++ Playground and HTTP Format, which exfiltrate source code and mine crypto secretly, despite being removed from official stores; they are republished under new names on VSCode.
  3. These extensions can fetch and execute remote JavaScript payloads, enabling arbitrary code execution, credential theft, ransomware deployment, and backdoor insertion without needing updates.
  4. TigerJack operates as a coordinated, multi-account operation, disguising malicious actors as legitimate developers with credible profiles, with the OpenVSX registry currently unresponsive to takedown reports.

The Issue

A malicious campaign led by a threat actor known as TigerJack has been targeting developers through malicious extensions on both Microsoft’s Visual Studio Code (VSCode) marketplace and the open-source OpenVSX registry. Although some extensions like “C++ Playground” and “HTTP Format” were removed from VSCode after accumulating around 17,000 downloads—due to their malicious functionalities—they still remain accessible on OpenVSX. These extensions exploit user trust: “C++ Playground” secretly exfiltrates source code by monitoring keystrokes, while “HTTP Format” runs a cryptocurrency miner in the background, consuming all of the host’s resources. Additionally, TigerJack repeatedly rebrands and reuploads similar malicious tools under new names on the VSCode marketplace, despite their removal, making them accessible to unsuspecting users. The dangerous payloads include forcibly executing remote JavaScript code, which allows the attacker to steal sensitive credentials, deploy ransomware, or inject backdoors into projects, effectively turning compromised developer environments into launchpads for broader cyberattacks.

This activity was uncovered by researchers at Koi Security, who describe TigerJack as operating a sophisticated, coordinated multi-account operation that disguises malicious tools with convincing developer personas, including credible profiles and detailed project descriptions. The group’s tactics involve dynamically pushing malicious payloads without requiring updates to the extensions, heightening their threat level. Koi Security reported these findings to OpenVSX; however, as of the report’s writing, the registry’s maintainers had yet to respond, leaving the extensions available for download. The situation underscores the importance for developers to be cautious and only install packages from reputable, trusted sources to prevent falling victim to such stealthy and persistent cyber threats.

Risks Involved

TigerJack, a malicious threat actor, continuously targets developers through the distribution of dangerous extensions on Microsoft’s VSCode marketplace and OpenVSX, an open-source alternative registry, with the intent to steal cryptocurrency, plant backdoors, and gain unauthorized access. Despite the removal of two malicious extensions from VSCode following over 17,000 downloads, they still remain on OpenVSX, and the attacker persistently reassets the same malware under new identities on the VSCode platform. The malicious extensions, such as C++ Playground and HTTP Format, operate by exfiltrating source code and secretly mining cryptocurrencies, respectively, while others dynamically fetch and execute remote JavaScript payloads, enabling the attacker to steal credentials, deploy ransomware, or infiltrate corporate networks through backdoors. The operation appears highly coordinated, with TigerJack masquerading as legitimate developers through various fake profiles, making detection difficult. The ongoing presence of these threats underscores the critical need for developers to Vet extensions rigorously and rely solely on reputable sources, as the potential impacts include data breaches, compromised systems, and financial theft.

Fix & Mitigation

Timely remediation is crucial when malicious crypto-stealing Visual Studio Code (VSCode) extensions reappear on OpenVSX because delays can lead to widespread theft, compromised user data, and damage to trust within the developer community. Rapid identification and response help minimize the impact, protect sensitive information, and maintain platform integrity.

Mitigation Strategies

  • Immediate Blockade: Disable or remove known malicious extensions from the platform.

  • User Alerts: Notify users about the threat and advise updating or removing the affected extensions.

  • Version Control: Implement stricter review and approval processes for new and updated extensions.

  • Enhanced Monitoring: Use automated tools to detect suspicious behaviors or code in new extension submissions.

  • Security Patches: Release prompt updates to fix vulnerabilities exploited by malicious extensions.

  • Collaboration: Work with security communities and open-source contributors to identify and address threats swiftly.

Explore More Security Insights

Stay informed on the latest Threat Intelligence and Cyberattacks.

Understand foundational security frameworks via NIST CSF on Wikipedia.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1

CISO Update Cybersecurity MX1
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleLapsus$ Hunters Extortion Site Goes Dark: What’s Next?
Next Article CISO Conversations: Are Microsoft’s Deputy CISOs the Future?
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

European Commission Confirms Data Breach After AWS Account Hack

March 28, 2026

European Commission Web Hosts Hit by Major Data Breach

March 27, 2026

RSAC: Uniting Cybersecurity Insights, Innovation, and Community

March 27, 2026

Comments are closed.

Latest Posts

European Commission Confirms Data Breach After AWS Account Hack

March 28, 2026

European Commission Web Hosts Hit by Major Data Breach

March 27, 2026

RSAC: Uniting Cybersecurity Insights, Innovation, and Community

March 27, 2026

Security Leaders Foresee the Next Two Years as ‘Insane’

March 27, 2026
Don't Miss

European Commission Confirms Data Breach After AWS Account Hack

By Staff WriterMarch 28, 2026

Top Highlights The European Commission confirmed a data breach caused by a targeted cyberattack on…

European Commission Web Hosts Hit by Major Data Breach

March 27, 2026

RSAC: Uniting Cybersecurity Insights, Innovation, and Community

March 27, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • European Commission Confirms Data Breach After AWS Account Hack
  • Cybertech Weekly: Top Highlights and Trends
  • European Commission Web Hosts Hit by Major Data Breach
  • RSAC: Uniting Cybersecurity Insights, Innovation, and Community
  • Security Leaders Foresee the Next Two Years as ‘Insane’
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

European Commission Confirms Data Breach After AWS Account Hack

March 28, 2026

Cybertech Weekly: Top Highlights and Trends

March 27, 2026

European Commission Web Hosts Hit by Major Data Breach

March 27, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202629 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202515 Views

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.