Security
Beware: Malicious Crypto-Stealing Extensions Return to OpenVSX

Malicious Crypto-Stealing VSCode Extensions Resurface on OpenVSX
Reports indicate that a threat actor known as TigerJack is actively targeting developers with malicious extensions on Microsoft’s Visual Code (VSCode) marketplace and OpenVSX registry. Their primary goal is to steal cryptocurrency and implant backdoors on unsuspecting users’ systems.
Despite two of the extensions being removed from VSCode after garnering 17,000 downloads, they continue to exist on OpenVSX. TigerJack has a pattern of republishing the same malicious code under new names on the VSCode marketplace, evading detection.
OpenVSX serves as a community-maintained open-source extension marketplace, offering an independent and vendor-neutral registry as an alternative to Microsoft’s platform. Notably, it is the default marketplace for VSCode-compatible editors like Cursor and Windsurf that face technical or legal restrictions on the official VSCode marketplace.
Researchers from Koi Security have uncovered TigerJack’s campaign, revealing that at least 11 malicious VSCode extensions have been distributed since the beginning of the year. Among these, “C++ Playground” and “HTTP Format” stand out, with both being reintroduced on the platform under new accounts.
When activated, “C++ Playground” discreetly monitors C++ files for edits, exfiltrating source code to external endpoints. On the other hand, “HTTP Format” functions as intended but concurrently runs a CoinIMP miner in the background, utilizing the host’s processing power for cryptocurrency mining without authorization.
Source: Koi Security
Another set of malicious extensions from TigerJack, namely “cppplayground,” “httpformat,” and “pythonformat,” fetch JavaScript code from a predefined address for execution on the host. This approach enables arbitrary code execution without the need for extension updates, posing a significant threat to users.

Source: Koi Security
The researchers emphasize that this third type of malicious extension is particularly dangerous as it allows TigerJack to push various payloads dynamically. These payloads can range from stealing credentials and deploying ransomware to injecting backdoors into projects and monitoring user activity in real-time.

Source: Koi Security
The researchers have identified TigerJack as a coordinated multi-account operation that masquerades as independent developers. They create an illusion of credibility through GitHub repositories, detailed feature lists, and extension names resembling legitimate tools, making it challenging for users to discern the malicious intent.
While Koi Security has alerted OpenVSX about the situation, the registry maintainer has yet to respond, leaving the two malicious extensions available for download. To safeguard themselves, developers are advised to only download packages from reputable and trustworthy publishers.

Participate in the Breach and Attack Simulation Summit to witness the future of security validation. Discover how AI-powered BAS is revolutionizing breach and attack simulation. Don’t miss this event shaping the future of your security strategy.
-
Video Games2 days ago
Tekken 8: Rise of the Shadows
-
Amazon2 days ago
Neil Young Takes a Stand: Pulling Music from Amazon in Protest of Jeff Bezos’ Support for Trump
-
Video Games1 day ago
Goku Takes on the Dragon Ball FighterZ Arena
-
Tech News2 days ago
Samsung Galaxy UI 8: Embracing the Big Free AI Upgrade
-
Security2 days ago
Critical Vulnerability Exposed: Oracle EBS Targeted in Recent Cyber Attacks by Cl0p Hackers
-
Microsoft2 days ago
Enhanced Copilot Features: Creating Office Documents and Gmail Integration
-
Microsoft2 days ago
Microsoft Launches Free Copilot Tools for Washington State Schools: Navigating the AI Learning Debate
-
Apple2 days ago
Exploring the Dystopian Realms of Pluribus: An Apple Original Series Trailer