Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Location-Based Gaming NFTs: How GPS and Blockchain Are Changing the Way We Play

May 2, 2026

ZachXBT Exposes US Law Firm Gerstein Harrow’s $71M Grab of Stolen Lazarus Funds

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»New Attacks Exploit VSCode Extensions and npm Packages
New Attacks Exploit VSCode Extensions and npm Packages
Security

New Attacks Exploit VSCode Extensions and npm Packages

February 24, 2026No Comments2 Mins Read

A recent investigation by security researchers has revealed a troubling surge in malicious campaigns exploiting popular development tools, including VSCode extensions and npm packages.

These campaigns compromise local development environments and pose risks to broader software supply chains.

From VSCode Marketplace to npm

Initially detected by ReversingLabs in the VSCode Marketplace, the campaign expanded to the npm ecosystem in late 2024.

One example of the latest malicious npm packages is etherscancontracthandler, with five versions identified. Three of these included obfuscated payloads designed to download additional malicious components. The similarities between the npm package and compromised VSCode extensions suggest the same threat actor or group created them.

These campaigns initially targeted the cryptocurrency community. However, by late October 2024, they broadened their focus, impersonating widely used applications like Zoom. Threat actors employed sophisticated tactics, including inflated install counts and fabricated reviews, to make the malicious extensions appear credible.

The investigation also uncovered common endpoints shared by the malicious VSCode extensions and npm packages. Some domains, such as “microsoft-visualstudiocode[.]com,” mimicked trusted sources to deceive users. Obfuscated JavaScript was used extensively to evade detection.

Securing Development Tools and Practices

This campaign underscores the need for vigilance in using development tools and third-party libraries. ReversingLabs recommends several best practices to mitigate risks:

  • Audit plugins and dependencies regularly for vulnerabilities

  • Validate and pre-approve development tools and their extensions before use

  • Conduct frequent security assessments to identify new risks introduced by updates or third-party libraries

Read more on securing the software supply chain: CISA Urges Improvements in US Software Supply Chain Transparency

“When using packages from public repositories, developers should keep an eye peeled for possible inclusion of a malicious code to avoid a malicious package being introduced as a dependency in some larger project,” ReversingLabs warned.

See also  Crypto Exchange CoinEx Promises Generous Bug Bounty Reward to Hacker After $70,000,000 Exploit

“Development organizations should also scrutinize the features and behaviors of the open source, third-party and commercial code they are relying on, to track dependencies and detect potential malicious payloads in them.”

Source link

attacks Exploit Extensions npm Packages VSCode

Related Posts

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026

Tax season fuels rise in crypto wallet scams, Kaspersky reports

May 2, 2026
Top Posts

Alzheimer’s, Now A Leading Cause Of Death In US, Is Becoming More Prevalent

September 24, 2023

‘Risk of a Stagflationary Shock’: BlackRock Analysts Stay Underweight on Long-Term U.S. Treasuries Amid Conflict in Middle East

March 10, 2026

Top 5 Smart Contract Wallet Projects In 2023

October 6, 2023

Type above and press Enter to search. Press Esc to cancel.