<img height="1" width="1" style="display: none" alt="" src="https://px.ads.linkedin.com/collect/?pid=1098858&amp;fmt=gif">

Hackers Target Developers Through Malicious VS Code and AI IDE Extensions

Hackers exploit VS Code with malicious extensions, risking developer credentials and major supply chain attacks.
Content Team

Cybersecurity researcher Mazin Ahmed discovered that attackers are exploiting VS Code and AI-powered IDEs like Cursor AI by publishing malicious extensions that bypass security screening. A fake Python linter called "Piithon-linter" successfully made it through Microsoft's marketplace security checks and could steal developer credentials and deploy remote access tools.

The malware activates automatically when VS Code launches, first checking for antivirus software before harvesting sensitive environment variables. It uses geofencing to avoid detection during Microsoft's sandbox testing and can target Windows, macOS, or Linux systems.

Most concerning is that OpenVSX marketplace, which powers Cursor AI, performs virtually no security verification. Since developers have access to source code, credentials, and production systems, these compromised extensions could lead to major supply chain attacks targeting entire organizations.

Source: Cybersecurity News

Share this article
Share on facebook Share on linkedin Share on twitter Share on email
blog_book_a_demo_cta_3x
Have questions about protecting your software?
Our escrow experts are standing by to help.
Book a free demo