Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code

0
Medium
Vulnerabilityrce
Published: Mon Jan 26 2026 (01/26/2026, 15:43:00 UTC)
Source: The Hacker News

Description

Two malicious Visual Studio Code extensions posing as AI coding assistants have been discovered with over 1. 5 million combined installs. These extensions covertly exfiltrate developer source code and file edits to China-based servers without user consent, while functioning normally to avoid suspicion. They capture every opened file and code modification, encode the data, and send it to a command-and-control server, with remote-triggered exfiltration of up to 50 files at once. Additionally, the extensions embed hidden analytics SDKs to fingerprint devices and build detailed user profiles. The campaign, named MaliciousCorgi, exploits trust in popular development tools and threatens intellectual property confidentiality. No known active exploits have been reported yet, but the scale of installation and stealthy behavior pose significant risks. European organizations relying on VS Code for software development are at risk of source code theft and espionage. Mitigation requires strict extension vetting, network monitoring, and restricting extension installation policies.

AI-Powered Analysis

AILast updated: 01/26/2026, 20:50:35 UTC

Technical Analysis

Cybersecurity researchers uncovered two malicious Visual Studio Code extensions marketed as AI-powered coding assistants, named "ChatGPT - 中文版" and "ChatGPT - ChatMoss (CodeMoss)," with a combined 1.5 million installs. These extensions operate as expected, providing autocomplete and error explanations, but simultaneously execute covert spyware functions. The malicious code captures every file opened and every source code change made by the developer, encoding the data in Base64 and transmitting it to a command-and-control server located in China (aihao123.cn). The spyware also supports remote commands to exfiltrate up to 50 files from the workspace in real time. Additionally, the extensions embed a hidden zero-pixel iframe loading four major Chinese analytics SDKs (Zhuge.io, GrowingIO, TalkingData, Baidu Analytics) to fingerprint devices and create detailed user profiles. This dual functionality allows the extensions to evade detection by blending legitimate utility with data theft. The campaign, dubbed MaliciousCorgi, exploits the trust developers place in official marketplace extensions. The extensions remain available on the official Visual Studio Marketplace, posing ongoing risk. The threat is compounded by the fact that these extensions do not require elevated privileges or explicit user interaction beyond installation and usage. The exfiltrated data could include proprietary source code, intellectual property, and sensitive development information, potentially enabling espionage, supply chain attacks, or further compromise. The report also references related supply chain vulnerabilities in JavaScript package managers but the primary focus is on the VS Code extension spyware.

Potential Impact

For European organizations, this threat poses significant risks to confidentiality and intellectual property protection. Developers using Visual Studio Code may unknowingly leak sensitive source code and development artifacts to foreign servers, potentially compromising proprietary software, trade secrets, and confidential projects. This could lead to competitive disadvantage, regulatory compliance violations (e.g., GDPR concerns over unauthorized data transfer), and reputational damage. Organizations involved in critical infrastructure, defense, finance, or technology sectors are particularly vulnerable due to the sensitivity of their codebases. The stealthy nature of the spyware, combined with its presence in the official marketplace, increases the likelihood of widespread infection. Additionally, the embedded device fingerprinting could facilitate targeted follow-up attacks or surveillance. The data exfiltration to China-based servers may raise geopolitical concerns and trigger regulatory scrutiny. The threat also undermines trust in the software supply chain and development tooling, complicating secure software development lifecycle (SDLC) practices.

Mitigation Recommendations

European organizations should implement strict policies governing the installation of Visual Studio Code extensions, limiting installations to vetted and trusted publishers only. Employ enterprise extension management tools to whitelist approved extensions and block others. Monitor network traffic for unusual outbound connections, especially to suspicious domains such as aihao123.cn, and implement DNS filtering to block known malicious command-and-control servers. Conduct regular audits of installed extensions and remove any unrecognized or suspicious ones. Educate developers about the risks of installing unverified extensions and encourage reporting of anomalies. Use endpoint detection and response (EDR) solutions capable of detecting unusual file access and exfiltration behaviors. Consider sandboxing development environments or using isolated containers to limit data exposure. Collaborate with Microsoft and the Visual Studio Marketplace to report and expedite removal of malicious extensions. Finally, integrate code repository monitoring to detect unauthorized code leaks and enforce strict access controls on sensitive source code repositories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/01/malicious-vs-code-ai-extensions-with-15.html","fetched":true,"fetchedAt":"2026-01-26T20:50:01.081Z","wordCount":1270}

Threat ID: 6977d37c4623b1157cbb6739

Added to database: 1/26/2026, 8:50:04 PM

Last enriched: 1/26/2026, 8:50:35 PM

Last updated: 1/26/2026, 11:46:53 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats