Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

TON Price Prediction: $1.50 Target as Technical Indicators Signal Potential 13% Rally

May 2, 2026

The Cheap Foreign Labor Regime Blocking Agricultural Intelligence

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»New Attacks Exploit VSCode Extensions and npm Packages
New Attacks Exploit VSCode Extensions and npm Packages
Security

New Attacks Exploit VSCode Extensions and npm Packages

February 24, 2026No Comments2 Mins Read

A recent investigation by security researchers has revealed a troubling surge in malicious campaigns exploiting popular development tools, including VSCode extensions and npm packages.

These campaigns compromise local development environments and pose risks to broader software supply chains.

From VSCode Marketplace to npm

Initially detected by ReversingLabs in the VSCode Marketplace, the campaign expanded to the npm ecosystem in late 2024.

One example of the latest malicious npm packages is etherscancontracthandler, with five versions identified. Three of these included obfuscated payloads designed to download additional malicious components. The similarities between the npm package and compromised VSCode extensions suggest the same threat actor or group created them.

These campaigns initially targeted the cryptocurrency community. However, by late October 2024, they broadened their focus, impersonating widely used applications like Zoom. Threat actors employed sophisticated tactics, including inflated install counts and fabricated reviews, to make the malicious extensions appear credible.

The investigation also uncovered common endpoints shared by the malicious VSCode extensions and npm packages. Some domains, such as “microsoft-visualstudiocode[.]com,” mimicked trusted sources to deceive users. Obfuscated JavaScript was used extensively to evade detection.

Securing Development Tools and Practices

This campaign underscores the need for vigilance in using development tools and third-party libraries. ReversingLabs recommends several best practices to mitigate risks:

  • Audit plugins and dependencies regularly for vulnerabilities

  • Validate and pre-approve development tools and their extensions before use

  • Conduct frequent security assessments to identify new risks introduced by updates or third-party libraries

Read more on securing the software supply chain: CISA Urges Improvements in US Software Supply Chain Transparency

“When using packages from public repositories, developers should keep an eye peeled for possible inclusion of a malicious code to avoid a malicious package being introduced as a dependency in some larger project,” ReversingLabs warned.

See also  Murfreesboro residents lose $4 million to Bitcoin scams

“Development organizations should also scrutinize the features and behaviors of the open source, third-party and commercial code they are relying on, to track dependencies and detect potential malicious payloads in them.”

Source link

attacks Exploit Extensions npm Packages VSCode

Related Posts

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026
Top Posts

Ethereum Foundation wants the network to be the trust layer for AI

March 4, 2026

Ethereum bots are burning over 50% of gas fees so ETH strangely needs privacy tech to fix it at scale

February 17, 2026

Rising Rates Gives New Life to Interest-Bearing Stablecoins

September 30, 2023

Type above and press Enter to search. Press Esc to cancel.