Thai Times

Covering the Thai Renaissance
Tuesday, Mar 10, 2026

Hackers Are Hiding Malware in Open-Source Tools and IDE Extensions

The common belief that “open source is safe because everyone can inspect the code” is misleading. In reality, most open-source projects include add-ons and components that are not open source at all — and these hidden parts can easily contain spyware, malware, and viruses. Once installed, they can take over both the user’s computer and the servers running the so-called open-source code, giving hackers full control to do whatever they want.

A newly uncovered cyberattack—one of the most sophisticated developer-focused campaigns seen in recent years—is weaponizing the daily workflow of software engineers. 

Security companies have revealed a malicious operation in which attackers insert stealthy malware into seemingly harmless extensions and open-source tools used by tens of thousands of developers worldwide. 

These extensions appear completely legitimate, yet silently exfiltrate highly sensitive data such as passwords, Wi-Fi access credentials, authentication tokens, clipboard contents, and even live screenshots taken directly from developers’ machines.


Compromised VS Code Extensions: “Bitcoin Black” and “Codo AI”

Two Visual Studio Code extensions were confirmed to contain embedded malicious components: the Bitcoin Black theme and an AI assistant tool called Codo AI. Both extensions looked fully legitimate on the marketplace and performed their advertised functions, which helped them evade suspicion and achieve wide adoption.

Once installed, the extensions deployed an additional malicious payload that continuously harvested data from infected devices. The threat actors were not content with collecting passwords alone. The malware captured real-time screenshots of developers’ screens—revealing source code, Slack discussions, credentials, internal documentation, and confidential project directories.

This level of visibility allows attackers to map entire workflows, understand sensitive architectures, and target organizations with precision.


The Attack Technique: DLL Hijacking as a Delivery Vehicle

The operation relied on an advanced method known as DLL hijacking, which abuses the way legitimate software loads system libraries.

The attackers downloaded a real, benign screenshot tool (Lightshot) onto the victim’s machine, pairing it with a malicious DLL that carried the same filename as the tool’s expected library. When Lightshot launched, it automatically loaded the attacker’s counterfeit DLL. This triggered the malware’s execution without raising suspicion.

Security researchers found that the malware collected:

  • Continuous screenshots and clipboard data

  • Wi-Fi passwords and saved wireless credentials

  • Browser cookies, authentication tokens, and active sessions (via Chrome and Edge in headless mode)

  • Information about installed software, running processes, and development tools

Koi Security reports that the attackers have been iterating and improving the operation, increasingly using “clean” and innocuous-looking scripts to blend in with normal developer activity.


The Campaign Is Spreading Beyond VS Code

While the first findings emerged in VS Code, similar malicious injections are now appearing across the broader open-source ecosystem:

  • npm and Go: Malware packages imitating the names of popular, trusted libraries

  • Rust: A library called finch-rust masqueraded as a scientific computation tool, but instead loaded an additional malware component called sha-rust

This reflects a direct attack on the software supply chain—the trust mechanism developers rely on when importing packages, extensions, or dependencies. By compromising tools that sit at the heart of software development, attackers gain privileged access to entire organizations.


Why This Threat Is So Dangerous

A single developer installing one benign-looking extension can unknowingly trigger a breach across the entire company:

  • Theft of core, proprietary source code

  • Takeover of GitHub and other cloud development accounts

  • Infection of CI/CD pipelines and build environments

  • Exposure of sensitive customer data, credentials, and internal architecture

Because development environments are privileged by design—holding secrets, tokens, SSH keys, and code—the blast radius of compromise is enormous.

Traditional static code scanning is insufficient for detecting these attacks. The extensions themselves often appear legitimate or include harmless code alongside hidden payloads. What is required is real-time behavioral monitoringcapable of flagging anomalous actions—such as a theme extension attempting to access stored passwords.


Recommended Security Measures for Developers and Organizations

To reduce exposure, cybersecurity firms recommend the following defensive steps:

  1. Enable multi-factor authentication on all development accounts, including GitHub, GitLab, cloud providers, and CI/CD tools.

  2. Verify the identity and reputation of extension publishers before installation.

  3. Avoid anonymous, poorly reviewed, or unknown plugins—even if they appear harmless.

  4. Adopt security tools that include behavioral detection, not only static scanning.

  5. Treat all AI-powered development tools with caution, especially those requesting elevated system permissions.

  6. Conduct regular audits of development environments, including browser sessions, secrets, stored tokens, and installed extensions.


This attack marks a turning point in developer-focused cybercrime. 

By targeting the very tools that developers rely on daily, attackers gain unprecedented access to the global software ecosystem. The findings underscore the urgent need for stronger supply-chain security, rigorous extension vetting, and behavioral monitoring to defend the world’s most sensitive development workflows.

Newsletter

Related Articles

0:00
0:00
Close
Thailand Moves Toward Emergency Energy Decree as Middle East Conflict Threatens Fuel Supplies
New Lao–Thai Friendship Bridge Earns Over Two Point Two Million Dollars in First Month
Thailand’s ‘Lisa Effect’ Drives Global Interest in Visiting the Red Lotus Sea
Thailand Braces for Intense Heat and Possible Summer Storms from March Eleven to Thirteen
Thailand Warns ‘Mule SIM’ Participants They Face Up to Three Years in Prison
Diplomatic and Business Leaders Move to Strengthen Thailand–South Korea Economic Partnership
Thailand Prepares for Economic Shockwaves as Middle East War Disrupts Energy and Travel
Thailand Promotes Muay Thai Tourism to Global Industry Leaders at ITB Berlin
Thailand’s ‘Blue Wave’ Election Result Deals Major Setback to Reform Movement
Thailand Reinforces Fossil Fuel Strategy as Middle East Conflict Disrupts Global Energy Flows
Tomorrowland Thailand Debut Sells Out as 150,000 Tickets Vanish Within Moments
Reformist Leader Natthaphong Tops Polls Ahead of Thailand’s February Election
Fuel Price Controls Cost Thai State 178.1 Billion Baht in Lost Tax Revenue
Thailand Launches Public–Private Alliance to Lead Asia’s Expanding Wellness Economy
Travelers Urged to Book Early as Middle East Conflict Drives Global Airfares Higher
Low-Carbon Rice Farming Initiative Gains Momentum in Thailand’s Central Plains
Fuel Can Sales Ban Strains Fishing Communities and Raises Concerns Over Seafood Supply
Thailand Confronts Economic Headwinds as Middle East Conflict Intensifies
Major Flight Disruptions Leave Hundreds of Passengers Stranded Across Thailand
Automation Expo Thailand Wraps Up With Strong Turnout and Industry Momentum
From Brazil to Bayern Munich: Maycon Cardozo’s Unusual Path Through Thailand’s World Squad
Cobra Gold Exercise Concludes as Washington National Guard and Thailand Strengthen Disaster Response Partnership
Rising Middle East Tensions Expected to Redirect Wealth Into Thailand’s Luxury Property Market
Thailand Investigates Fifteen Chinese-Linked Firms Over Alleged Nominee Structures in Aromatic Coconut Trade
Bangkok’s Flea Markets Power a Vintage Shopping Boom in Thailand’s Capital
Thailand Moves to Protect Households from Middle East Energy Shock
Thailand Showcases ‘Healing Luxury’ and Sustainable Tourism Vision at ITB Berlin
Thailand’s Energy Storage Sector Struggles to Keep Pace With Rapid Renewable Expansion
Thailand’s AIS Launches One Billion Dollar International Bond to Expand Digital Infrastructure
Thailand Accelerates Evacuation Efforts for Citizens in the Middle East as Regional Tensions Intensify
Thailand Redefines Luxury Travel by Placing Healing and Wellbeing at the Heart of Tourism
Thailand Faces Energy Shock Risks but Enters Crisis Stronger Than in 2022
China slowdown vs. Southeast Asia boom: Why Thailand, Vietnam, and Indonesia are gaining global manufacturing share
China Lowers 2026 Growth Target to 4.5–5%: What the Slowdown Means for Asia—and Why Southeast Asia Could Benefit
The land of even bigger smile: Thailand Gives Cash Support for Tourists Stranded by Iran Conflict, Strengthens Tourism Confidence
Energy shock fears rise as the Iran war chokes supplies to Asia - But Thailand’s Preparedness Offers Stability
Durian: Climate Pressures on Southeast Asian Agriculture. Lessons from Indonesia’s Durian Sector and Opportunities for Regional Economic Resilience
Policy Roadmap for Thailand’s New Government Begins to Take Shape
Thailand’s Central Retail Plans More Than 30 Major Stores in Vietnam by 2029
Middle East Conflict Raises Inflation Risks for Thailand as Energy and Shipping Costs Surge
British Couple Stranded in Thailand as Middle East Airspace Closures Disrupt Global Flights
AVATR 07 Begins Mass Deliveries in Thailand as Premium EV Expansion Accelerates
Thailand-Based Crypto Investor Donates Additional £3 Million to Reform UK
Thailand Turns to U.S. LNG Supplies to Reduce Energy Risk from Strait of Hormuz Crisis
Thailand Moves to Halt Oil Exports to Safeguard Energy Security Amid Middle East Crisis
Anutin Affirms Thailand Fully Prepared to Host IMF–World Bank Annual Meetings in 2026
Thai Election Commission Certifies Results, Opening Door for New Parliament
Thailand Waives Visa Overstay Penalties for Travelers Stranded by Middle East Flight Disruptions
Hundreds Gather for Vibrant Purim Celebration at Chabad House on Thailand’s Koh Samui
Hun Sen’s Son Calls for Peaceful Relations with Thailand Amid Regional Tensions
×