Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Location-Based Gaming NFTs: How GPS and Blockchain Are Changing the Way We Play

May 2, 2026

ZachXBT Exposes US Law Firm Gerstein Harrow’s $71M Grab of Stolen Lazarus Funds

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Malicious VS Code Extensions Exploit Name Reuse Loophole
Malicious VS Code Extensions Exploit Name Reuse Loophole
Security

Malicious VS Code Extensions Exploit Name Reuse Loophole

February 8, 2026No Comments2 Mins Read

A new campaign involving malicious Visual Studio Code (VS Code) extensions has exposed a loophole in the VS Code Marketplace that allows threat actors to reuse names of previously removed packages.

The extensions, which carried the name “shiba,” delivered ransomware through a multi-stage attack.

How the Attack Works

ReversingLabs researchers found that one of the malicious extensions, ahbanC.shiba, was a simple downloader.

Once installed, it executed the command shiba.aowoo, which retrieved a second payload from a remote server. The script encrypted files in a designated test folder and demanded ransom in the form of one Shiba Inu token, an Ethereum-based cryptocurrency. Notably, as in earlier cases, no actual wallet address was provided for payment.

This technique mirrored an earlier case in the Python Package Index (PyPI), where attackers reused the name of a removed package to spread malware.

The reuse of names on VS Code Marketplace, however, contradicts the platform’s own documentation, which states extension names must be unique.

Read more on software supply chain attacks: Supply Chain Incident Imperils Glasgow Council Services and Data

The ReversingLabs investigation revealed that the issue stems from how VS Code handles extension removal. Marketplace publishers can either unpublish or remove an extension. While unpublished extensions retain their names and statistics, removed extensions free up their names for anyone to reuse. This gap allowed attackers to republish malicious code under names associated with previously deleted extensions.

ReversingLabs confirmed this flaw by successfully publishing new test extensions under names previously used by malicious packages, such as “Solidity-Ethereum.”

Broader Implications for Malware Delivery

The timeline of the shiba campaign showed repeated use of this tactic. Extensions under different publishers but sharing the same name surfaced from late 2024 through mid-2025.

See also  German Police Take Down Kingdom Market Dark Web Marketplace

Researchers noted that, while this incident likely has no link to ransomware groups like Black Basta, the strategy aligns with broader criminal interest in leveraging public repositories for malware delivery.

Key takeaways from ReversingLabs’ findings include:

  • Removed extension names can be reused freely

  • Malicious actors can exploit this to impersonate legitimate tools

  • Developers must remain cautious when adding Marketplace packages

“VS Code Marketplace is becoming more and more popular amongst malicious actors,” ReversingLabs researchers said.

“The discovery of this loophole opens a new can of worms.”

At the time of writing, there is no public indication that Microsoft has taken action specifically to address the ability for different publishers to reuse extension names once a package is removed.

Source link

Code Exploit Extensions Loophole Malicious Reuse

Related Posts

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026

Tax season fuels rise in crypto wallet scams, Kaspersky reports

May 2, 2026
Top Posts

3 Times Bankman-Fried Allegedly Lied Before He Was Famous

October 6, 2023

Rhea Finance hit by $7.6M exploit as attacker manipulates liquidity pools

April 18, 2026

Bitcoin Sinks Nearly 3% to $26.7K; Bulls Ponder How Low It Can Go

October 12, 2023

Type above and press Enter to search. Press Esc to cancel.