London Daily

Focus on the big picture.
Saturday, Mar 14, 2026

Hackers Are Hiding Malware in Open-Source Tools and IDE Extensions

The common belief that “open source is safe because everyone can inspect the code” is misleading. In reality, most open-source projects include add-ons and components that are not open source at all — and these hidden parts can easily contain spyware, malware, and viruses. Once installed, they can take over both the user’s computer and the servers running the so-called open-source code, giving hackers full control to do whatever they want.

A newly uncovered cyberattack—one of the most sophisticated developer-focused campaigns seen in recent years—is weaponizing the daily workflow of software engineers. 

Security companies have revealed a malicious operation in which attackers insert stealthy malware into seemingly harmless extensions and open-source tools used by tens of thousands of developers worldwide. 

These extensions appear completely legitimate, yet silently exfiltrate highly sensitive data such as passwords, Wi-Fi access credentials, authentication tokens, clipboard contents, and even live screenshots taken directly from developers’ machines.


Compromised VS Code Extensions: “Bitcoin Black” and “Codo AI”

Two Visual Studio Code extensions were confirmed to contain embedded malicious components: the Bitcoin Black theme and an AI assistant tool called Codo AI. Both extensions looked fully legitimate on the marketplace and performed their advertised functions, which helped them evade suspicion and achieve wide adoption.

Once installed, the extensions deployed an additional malicious payload that continuously harvested data from infected devices. The threat actors were not content with collecting passwords alone. The malware captured real-time screenshots of developers’ screens—revealing source code, Slack discussions, credentials, internal documentation, and confidential project directories.

This level of visibility allows attackers to map entire workflows, understand sensitive architectures, and target organizations with precision.


The Attack Technique: DLL Hijacking as a Delivery Vehicle

The operation relied on an advanced method known as DLL hijacking, which abuses the way legitimate software loads system libraries.

The attackers downloaded a real, benign screenshot tool (Lightshot) onto the victim’s machine, pairing it with a malicious DLL that carried the same filename as the tool’s expected library. When Lightshot launched, it automatically loaded the attacker’s counterfeit DLL. This triggered the malware’s execution without raising suspicion.

Security researchers found that the malware collected:

  • Continuous screenshots and clipboard data

  • Wi-Fi passwords and saved wireless credentials

  • Browser cookies, authentication tokens, and active sessions (via Chrome and Edge in headless mode)

  • Information about installed software, running processes, and development tools

Koi Security reports that the attackers have been iterating and improving the operation, increasingly using “clean” and innocuous-looking scripts to blend in with normal developer activity.


The Campaign Is Spreading Beyond VS Code

While the first findings emerged in VS Code, similar malicious injections are now appearing across the broader open-source ecosystem:

  • npm and Go: Malware packages imitating the names of popular, trusted libraries

  • Rust: A library called finch-rust masqueraded as a scientific computation tool, but instead loaded an additional malware component called sha-rust

This reflects a direct attack on the software supply chain—the trust mechanism developers rely on when importing packages, extensions, or dependencies. By compromising tools that sit at the heart of software development, attackers gain privileged access to entire organizations.


Why This Threat Is So Dangerous

A single developer installing one benign-looking extension can unknowingly trigger a breach across the entire company:

  • Theft of core, proprietary source code

  • Takeover of GitHub and other cloud development accounts

  • Infection of CI/CD pipelines and build environments

  • Exposure of sensitive customer data, credentials, and internal architecture

Because development environments are privileged by design—holding secrets, tokens, SSH keys, and code—the blast radius of compromise is enormous.

Traditional static code scanning is insufficient for detecting these attacks. The extensions themselves often appear legitimate or include harmless code alongside hidden payloads. What is required is real-time behavioral monitoringcapable of flagging anomalous actions—such as a theme extension attempting to access stored passwords.


Recommended Security Measures for Developers and Organizations

To reduce exposure, cybersecurity firms recommend the following defensive steps:

  1. Enable multi-factor authentication on all development accounts, including GitHub, GitLab, cloud providers, and CI/CD tools.

  2. Verify the identity and reputation of extension publishers before installation.

  3. Avoid anonymous, poorly reviewed, or unknown plugins—even if they appear harmless.

  4. Adopt security tools that include behavioral detection, not only static scanning.

  5. Treat all AI-powered development tools with caution, especially those requesting elevated system permissions.

  6. Conduct regular audits of development environments, including browser sessions, secrets, stored tokens, and installed extensions.


This attack marks a turning point in developer-focused cybercrime. 

By targeting the very tools that developers rely on daily, attackers gain unprecedented access to the global software ecosystem. The findings underscore the urgent need for stronger supply-chain security, rigorous extension vetting, and behavioral monitoring to defend the world’s most sensitive development workflows.

Newsletter

Related Articles

0:00
0:00
Close
Middle East War Highlights Strategic Importance of Strong UK–Ireland Cooperation
Weak Growth Signals UK Economy Was Faltering Even Before Middle East Energy Shock
Marks & Spencer Tops UK Fashion Retail Rankings as Most Considered Brand
United States Launches Trade Investigation Into Allies Over Forced Labour Practices
United States Launches Trade Investigation Into Allies Over Forced Labour Practices
Russia Accuses Britain Over Storm Shadow Strike as London Reaffirms Ukraine’s Right to Self-Defence
Russia Accuses Britain Over Storm Shadow Strike as London Reaffirms Ukraine’s Right to Self-Defence
Royal Navy to Acquire Twenty Uncrewed Surface Vessels for Autonomous Warfare Testing
Russia Summons British and French Envoys After Ukrainian Storm Shadow Strike on Strategic Facility
Starmer Confirms Britain Will Maintain Sanctions on Russia Despite U.S. Policy Shift
UK Moves to Refine AI Definition in Investment Security Reform
UK Economy Stalls in January as Growth Unexpectedly Falls to Zero
Asian Energy Security Tested as Strait of Hormuz Disruption Threatens Oil Supplies
Iran Sets Three Conditions for Ending Regional War as Diplomatic Efforts Intensify
Tesla Secures Approval to Supply Electricity Directly to Homes Across Britain
Prince William Delivers Tribute to Australia’s Naval Alliance Amid Renewed Royal Spotlight on the Country
UK Foreign Secretary Travels to Saudi Arabia to Reinforce Support for Regional Allies
Putin’s ‘Hidden Hand’ May Be Assisting Iran in Conflict With Trump, UK Defence Secretary Warns
UK Sets April Deadline for Tech Platforms to Strengthen Online Protections for Children
Elon Musk Moves Into Britain’s Energy Market as Tesla Wins Licence to Supply Power
UK Watchdog Warns Fuel Retailers Against Profiteering Amid Iran War Price Surge
Report Claims Iran Used UK Charity Network to Expand Influence
United States and United Kingdom Establish Joint Standards for Counter-Drone Technology
Iran May Be Laying Naval Mines in Strait of Hormuz, UK Warns Amid Escalating Gulf Tensions
US Deploys Bunker-Buster Bombs to UK Airbase as Iran Conflict Intensifies
British Troops in Iraq Intercept Iranian Drones Targeting Coalition Base
Release of Mandelson Files Raises Tensions as UK Seeks Stable Relations With Donald Trump
UK Documents Reveal Starmer Was Warned About Mandelson’s Epstein Links Before Ambassador Appointment
Nearly Five Hundred UK Mortgage Deals Withdrawn in Two Days as Market Volatility Forces Lenders to Reprice
Three Cargo Ships Hit Near Iran as Attacks Spread to Strategic Strait of Hormuz
Why British Police Repeatedly Declined to Investigate Jeffrey Epstein’s UK Links
UK Parliament Ends Hereditary Seats in House of Lords, Closing Chapter on Centuries of Aristocratic Lawmaking
EU and UK Urge Israel to Act Against Rising West Bank Settler Violence Amid Regional Tensions
US Senator John Kennedy Says Keir Starmer Should Not Be Trusted for Military Advice Amid Iran War Debate
UK High Court Rejects Attempt to Revive Terrorism Charge Against Kneecap Rapper
Revolut Secures Full UK Banking Licence After Multi-Year Regulatory Wait
Kentucky’s Bench Boost Powers Wildcats Past LSU in SEC Tournament Opener
British Couple Die After Being Pulled From Water at Australian Beach During Family Visit
Global Energy Agency Announces Record Release of 400 Million Barrels to Stabilize Oil Markets Amid Hormuz Disruption
British Airways Suspends UK Repatriation Flights as Middle East Travel Disruption Deepens
US Forces Prepare Ordnance at RAF Fairford as Strategic Bombers Deploy for Middle East Operations
Nigel Farage Faces Criticism After Saying Britain Should Stay Out of Iran War
Landmark UK Trial Begins Over Sony’s PlayStation Store Pricing
UK High Court Rejects Bid to Challenge Britain’s Chagos Islands Agreement With Mauritius
Finnish Duo Triumphs in England’s Annual Wife-Carrying Race, Winning a Barrel of Ale
How U.S. and UK National Security Strategies Are Reshaping the Global Business Landscape
Green Party Gains Momentum as Labour Shifts Toward the Political Centre
Royal Navy Destroyer HMS Dragon Sets Sail for Eastern Mediterranean as Regional Tensions Rise
UK Homebuilder Persimmon Warns Iran Conflict Could Dent Property Buyer Confidence
Roman Abramovich Signals Legal Fight if UK Seeks to Seize Chelsea Sale Funds
×