Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

European Commission Confirms Data Breach After AWS Account Hack

March 28, 2026

Cybertech Weekly: Top Highlights and Trends

March 27, 2026

European Commission Web Hosts Hit by Major Data Breach

March 27, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Unlocking Hidden Supply Chain Risks in Over 100 VS Code Extensions
Cybercrime and Ransomware

Unlocking Hidden Supply Chain Risks in Over 100 VS Code Extensions

Staff WriterBy Staff WriterOctober 15, 2025No Comments4 Mins Read3 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Quick Takeaways

  1. Over 100 VS Code extension publishers leaked access tokens, enabling potential malicious updates and posing significant supply chain security risks, with over 550 embedded secrets from various providers like AWS, Google Cloud, and OpenAI.
  2. Leaked tokens have been linked to over 85,000 installations, and malicious extensions—some with seemingly legitimate functionality—have been used to steal source code, mine cryptocurrency, and establish backdoors.
  3. Threat actor TigerJack has actively published malicious VS Code extensions mimicking real tools, which can steal data, deploy malware, or remotely control systems through sophisticated, stealthy code updates.
  4. Microsoft has implemented security measures on its marketplace, but vulnerabilities remain across other platforms like Open VSX, allowing malicious extensions to proliferate and exploit developers’ trust.

Problem Explained

Recent investigations have revealed a significant security breach involving over 100 publishers of Visual Studio Code (VS Code) extensions, who inadvertently leaked sensitive access tokens embedded within their software packages. These tokens, which include credentials for various cloud services, AI providers, and databases, were stored insecurely — often hard-coded into the extensions — and led to over 550 secrets being exposed across more than 500 extensions, with more than 85,000 installs affected. The leak posed a severe risk because malicious actors could leverage these tokens to push harmful updates, inject malware, or even commandeer entire networks, as evidenced by a threat actor named TigerJack, who deployed malicious extensions capable of stealing source code, mining cryptocurrencies, and establishing remote backdoors.

This situation unfolded due to publishers’ neglect in safeguarding secrets and the inherent vulnerabilities of the extension ecosystem, which is exploited further by expanding alternative marketplaces like Open VSX, where similar security gaps exist. Although Microsoft responded by revoking leaked tokens and bolstering detection measures, the broader security landscape remains fragmented, enabling sophisticated attackers to continue targeting less-protected repositories. The reporting of these events has come from security researchers at Wiz, who identified the leaks and malicious campaigns, emphasizing the ongoing challenges in maintaining supply chain integrity in software development and distribution.

Risks Involved

Cyber risks related to Visual Studio Code (VS Code) extensions pose a significant threat to software supply chain security, chiefly due to leaked access tokens and malicious code insertions. Over 550 secrets, including credentials for AI providers, cloud services, and databases, have been uncovered within extensions, with more than 100 extensions leaking personal access tokens (PATs) that could enable attackers to distribute malware, steal source code, or compromise organizations—sometimes targeting high-profile entities. Threat actors like TigerJack exploit these vulnerabilities by publishing seemingly legitimate extensions that covertly deploy malware, keyloggers, or backdoors, often deploying updates that evade scrutiny. These risks are compounded by fragmented security protections across marketplaces, enabling malicious actors to migrate threats between platforms. Consequently, organizations face heightened risks of data breaches, service disruption, and supply chain compromise, underscoring the need for vigilant extension management, rigorous vetting, and proactive security measures such as secret scanning and centralized allowlisting to mitigate potential damages.

Possible Actions

Timely remediation is crucial in addressing the widespread exposure of over 100 VS Code extensions to hidden supply chain risks, as delays can lead to security breaches, data loss, and compromised project integrity. Rapid action minimizes the potential damage and restores developer trust and safety.

Assessment

  • Conduct comprehensive security audits of all affected extensions
  • Identify vulnerable or malicious components within the supply chain

Update & Patch

  • Release timely updates with security patches
  • Remove or replace compromised extensions with secure alternatives

Communication

  • Notify users about identified risks and remediation measures
  • Provide guidance on safe extension usage and updates

Mitigation

  • Implement strict vetting procedures for new extensions
  • Enable multi-factor authentication for extension publishers

Monitoring

  • Continuous monitoring of extension behaviors and signals
  • Establish incident response protocols for future threats

Explore More Security Insights

Stay informed on the latest Threat Intelligence and Cyberattacks.

Learn more about global cybersecurity standards through the NIST Cybersecurity Framework.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1

CISO Update computer security cyber attacks cyber news cyber security news cyber security news today cyber security updates cyber updates Cybersecurity data breach hacker news hacking news how to hack information security MX1 network security ransomware malware software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleROCon: Evolving from SOC to Agentic Risk Surface Management
Next Article F5 Breach: Nation-State Hackers Unleash Chaos
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

European Commission Confirms Data Breach After AWS Account Hack

March 28, 2026

European Commission Web Hosts Hit by Major Data Breach

March 27, 2026

RSAC: Uniting Cybersecurity Insights, Innovation, and Community

March 27, 2026

Comments are closed.

Latest Posts

European Commission Confirms Data Breach After AWS Account Hack

March 28, 2026

European Commission Web Hosts Hit by Major Data Breach

March 27, 2026

RSAC: Uniting Cybersecurity Insights, Innovation, and Community

March 27, 2026

Security Leaders Foresee the Next Two Years as ‘Insane’

March 27, 2026
Don't Miss

European Commission Confirms Data Breach After AWS Account Hack

By Staff WriterMarch 28, 2026

Top Highlights The European Commission confirmed a data breach caused by a targeted cyberattack on…

European Commission Web Hosts Hit by Major Data Breach

March 27, 2026

RSAC: Uniting Cybersecurity Insights, Innovation, and Community

March 27, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • European Commission Confirms Data Breach After AWS Account Hack
  • Cybertech Weekly: Top Highlights and Trends
  • European Commission Web Hosts Hit by Major Data Breach
  • RSAC: Uniting Cybersecurity Insights, Innovation, and Community
  • Security Leaders Foresee the Next Two Years as ‘Insane’
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

European Commission Confirms Data Breach After AWS Account Hack

March 28, 2026

Cybertech Weekly: Top Highlights and Trends

March 27, 2026

European Commission Web Hosts Hit by Major Data Breach

March 27, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202629 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202515 Views

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.