Thai Times

Covering the Thai Renaissance
Saturday, Dec 13, 2025

Hackers Are Hiding Malware in Open-Source Tools and IDE Extensions

The common belief that “open source is safe because everyone can inspect the code” is misleading. In reality, most open-source projects include add-ons and components that are not open source at all — and these hidden parts can easily contain spyware, malware, and viruses. Once installed, they can take over both the user’s computer and the servers running the so-called open-source code, giving hackers full control to do whatever they want.

A newly uncovered cyberattack—one of the most sophisticated developer-focused campaigns seen in recent years—is weaponizing the daily workflow of software engineers. 

Security companies have revealed a malicious operation in which attackers insert stealthy malware into seemingly harmless extensions and open-source tools used by tens of thousands of developers worldwide. 

These extensions appear completely legitimate, yet silently exfiltrate highly sensitive data such as passwords, Wi-Fi access credentials, authentication tokens, clipboard contents, and even live screenshots taken directly from developers’ machines.


Compromised VS Code Extensions: “Bitcoin Black” and “Codo AI”

Two Visual Studio Code extensions were confirmed to contain embedded malicious components: the Bitcoin Black theme and an AI assistant tool called Codo AI. Both extensions looked fully legitimate on the marketplace and performed their advertised functions, which helped them evade suspicion and achieve wide adoption.

Once installed, the extensions deployed an additional malicious payload that continuously harvested data from infected devices. The threat actors were not content with collecting passwords alone. The malware captured real-time screenshots of developers’ screens—revealing source code, Slack discussions, credentials, internal documentation, and confidential project directories.

This level of visibility allows attackers to map entire workflows, understand sensitive architectures, and target organizations with precision.


The Attack Technique: DLL Hijacking as a Delivery Vehicle

The operation relied on an advanced method known as DLL hijacking, which abuses the way legitimate software loads system libraries.

The attackers downloaded a real, benign screenshot tool (Lightshot) onto the victim’s machine, pairing it with a malicious DLL that carried the same filename as the tool’s expected library. When Lightshot launched, it automatically loaded the attacker’s counterfeit DLL. This triggered the malware’s execution without raising suspicion.

Security researchers found that the malware collected:

  • Continuous screenshots and clipboard data

  • Wi-Fi passwords and saved wireless credentials

  • Browser cookies, authentication tokens, and active sessions (via Chrome and Edge in headless mode)

  • Information about installed software, running processes, and development tools

Koi Security reports that the attackers have been iterating and improving the operation, increasingly using “clean” and innocuous-looking scripts to blend in with normal developer activity.


The Campaign Is Spreading Beyond VS Code

While the first findings emerged in VS Code, similar malicious injections are now appearing across the broader open-source ecosystem:

  • npm and Go: Malware packages imitating the names of popular, trusted libraries

  • Rust: A library called finch-rust masqueraded as a scientific computation tool, but instead loaded an additional malware component called sha-rust

This reflects a direct attack on the software supply chain—the trust mechanism developers rely on when importing packages, extensions, or dependencies. By compromising tools that sit at the heart of software development, attackers gain privileged access to entire organizations.


Why This Threat Is So Dangerous

A single developer installing one benign-looking extension can unknowingly trigger a breach across the entire company:

  • Theft of core, proprietary source code

  • Takeover of GitHub and other cloud development accounts

  • Infection of CI/CD pipelines and build environments

  • Exposure of sensitive customer data, credentials, and internal architecture

Because development environments are privileged by design—holding secrets, tokens, SSH keys, and code—the blast radius of compromise is enormous.

Traditional static code scanning is insufficient for detecting these attacks. The extensions themselves often appear legitimate or include harmless code alongside hidden payloads. What is required is real-time behavioral monitoringcapable of flagging anomalous actions—such as a theme extension attempting to access stored passwords.


Recommended Security Measures for Developers and Organizations

To reduce exposure, cybersecurity firms recommend the following defensive steps:

  1. Enable multi-factor authentication on all development accounts, including GitHub, GitLab, cloud providers, and CI/CD tools.

  2. Verify the identity and reputation of extension publishers before installation.

  3. Avoid anonymous, poorly reviewed, or unknown plugins—even if they appear harmless.

  4. Adopt security tools that include behavioral detection, not only static scanning.

  5. Treat all AI-powered development tools with caution, especially those requesting elevated system permissions.

  6. Conduct regular audits of development environments, including browser sessions, secrets, stored tokens, and installed extensions.


This attack marks a turning point in developer-focused cybercrime. 

By targeting the very tools that developers rely on daily, attackers gain unprecedented access to the global software ecosystem. The findings underscore the urgent need for stronger supply-chain security, rigorous extension vetting, and behavioral monitoring to defend the world’s most sensitive development workflows.

Newsletter

Related Articles

0:00
0:00
Close
Cambodian Forces Intensify Attacks Across Seven Border Sectors; Thai Military Responds with Drones and Artillery
Travel Safety After Renewed Thailand-Cambodia Clashes: What Tourists Should Know
Border Clashes Between Thailand and Cambodia Deepen Economic Strain and Political Uncertainty
Thai Border Evacuees Grapple with Uncertain Future as Fighting Resumes with Cambodia
Renewed Violence Erodes Two Trump-Backed Peace Accords in Southeast Asia and Central Africa
Thai Prime Minister Dissolves Parliament and Sets Path for Early Election
Fake Doctor in Uttar Pradesh Accused of Killing Woman After Performing YouTube-Based Surgery
Hackers Are Hiding Malware in Open-Source Tools and IDE Extensions
Traveling to USA? Homeland Security moving toward requiring foreign travelers to share social media history
United States Urges Immediate Halt to Fighting Between Thailand and Cambodia Amid Rising Casualties
33rd SEA Games Officially Open in Bangkok as Thailand Welcomes Southeast Asia’s Athletes
Hundreds of Thousands Flee as Thailand–Cambodia Border Clashes Escalate
Trump Announces He Will Phone Leaders in Bid to End Renewed Thailand–Cambodia Border War
Cambodia and Thailand Return to Open Conflict as Borders Erupt in Violence
Thailand Surpasses 30 Million Overseas Visitors Even as Annual Total Declines
Fighting Between Thailand and Cambodia Spreads Along Border as Death Toll Mounts
Thai-Cambodia border fighting poses minor GDP risk, but trade, tourism and political uncertainty loom, says KKP economist
Mark Zuckerberg Pulls Back From Metaverse After $70 Billion Loss as Meta Shifts Priorities to AI
Nvidia CEO Says U.S. Data-Center Builds Take Years while China ‘Builds a Hospital in a Weekend’
Indian Airports in Turmoil as IndiGo Cancels Over a Thousand Flights, Stranding Thousands
Hollywood Industry on Edge as Netflix Secures Near-$60 Bln Loan for Warner Bros Takeover
Thailand Submits Detailed Claim of New Cambodian-Laid Mines as Treaty Meeting Opens in Geneva
Two and a Half Weeks After the Major Outage: A Cloudflare Malfunction Brings Down Multiple Sites
New Google Thailand Chief Predicts Strong Growth for Kingdom’s Digital Economy
Mexican authorities freeze bank accounts of Miss Universe co-owner in organised-crime probe
Thai Police Arrest Hundreds in Latest Crackdown on Online ‘Romance’ and Get-Rich-Quick Scams
Thailand Freezes Ceasefire with Cambodia After Border Blast Rekindles Tensions
Thailand Signals Early 2026 Election Amid Mounting Economic Strain
Thai Food Village Debuts at Saudi Feast Food Festival 2025 Under Thai Commerce Minister Suphajee’s Lead
Thailand Lifts 53-Year Afternoon Alcohol Ban Ahead of Year-End Holiday Season
Thailand Confirms $107 Million Purchase of Israeli Barak MX Air-Defence System
Thai Finance Minister Ekniti Unveils Four-Pronged Strategy to Reset Economy
WBC Ratings Committee Begins Work at 63rd Convention in Bangkok
Southern Thailand Flood Crisis: Over Two Million People Affected as Waters Begin to Recede
Google warns of AI “irrationality” just as Gemini 3 launch rattles markets
Top Consultancies Freeze Starting Salaries as AI Threatens ‘Pyramid’ Model
Southeast Asia Floods Push Death Toll Above Nine Hundred as Storm Cluster Devastates Region
EU Firms Struggle with 3,000-Hour Paperwork Load — While Automakers Fear De Facto 2030 Petrol Car Ban
Thailand and China Mark 50 Years of Diplomacy with Renewed Focus on Knowledge Exchange and Strategic Partnership
Southern Thailand Floods Claim at Least 145 Lives as Water Recedes in Hat Yai
Thailand’s Flood Death Toll Climbs to 145 as Receding Waters Expose Massive Nationwide Damage
250 Still Missing in the Massive Fire, 94 Killed. One Day After the Disaster: Survivor Rescued on the 16th Floor
At least 33 dead in southern Thailand as Hat Yai hospital flooded and military mounts large-scale rescue operation
Thai Court Issues Arrest Warrant for Miss Universe Co-Owner After She Fails to Appear at Fraud Verdict Hearing
Thailand Orders Sam Altman’s World Project to Delete 1.2 Million Iris Scans and Halt Operations
Bangkok Gears Up for Formula 1: Thai Government Releases Plan for 5.7 km Street Circuit by 2028
Thailand and Cambodia Complete Major Phase of Joint Border Survey Between Pillars 52–59, Paving Way for Fence Construction
Miss Universe Owners in Mexico and Thailand Face Fraud and Trafficking Allegations Amid 2025 Pageant Fallout
Thai Pork Industry Warns of Collapse If US Meat Imports Are Granted Under New Trade Deal
Lamine Yamal? The ‘Heir to Messi’ Lost to Barcelona — and the Kingdom Is in a Frenzy
×