
A persistent threat actor has been systematically infiltrating developer environments through malicious Visual Studio Code (VSCode) extensions. This campaign employs a sophisticated, multi-pronged strategy that includes real-time code theft, covert cryptocurrency mining, and the installation of persistent backdoors for remote code execution (RCE).
By publishing functional and seemingly legitimate extensions, the actor, tracked as TigerJack, has successfully compromised thousands of developers, highlighting significant risks in the software supply chain and developer cybersecurity.
The Tiger Jack malware operates through several extensions that deliver on their promised functionality while performing malicious activities in the background, according to a cybersecurity report by Koi.Â
For example, the "C++ Playground" extension, which gained significant traction, was found to exfiltrate a developer's complete source code in real-time to an external server.Â
Another extension, "HTTP Format," secretly utilized the host machine's CPU to mine cryptocurrency using hardcoded credentials for the CoinIMP service.Â
More alarmingly, other extensions were discovered to contain a backdoor mechanism, enabling the threat actor to fetch and execute arbitrary code, granting them complete control over the compromised system.
Extensions:
This campaign exposes critical weaknesses in the security posture of developer marketplaces. Although Microsoft eventually removed the malicious extensions after they had infected over 17,000 users, the removal was done silently without notifying affected developers.Â
Furthermore, some of these malicious VSCode extensions remain active and available for download on alternative marketplaces like OpenVSX, which may lack robust security scanning.Â
The threat actor has also demonstrated resilience by republishing the same malware under new publisher accounts, creating a "shell game" that evades simple takedown measures and continues to place developers at risk.
Last month, the first known instance of an obfuscated AutoIt loader being used to deliver NBMiner was observed.