Malicious AI extensions on VSCode Marketplace steal developer data
Recorded: Jan. 23, 2026, 10 p.m.
| Original | Summarized |
Malicious AI extensions on VSCode Marketplace steal developer data News Featured Curl ending bug bounty program after flood of AI slop reports INC ransomware opsec fail allowed data recovery for 12 US orgs Cisco fixes Unified Communications RCE zero day exploited in attacks Hackers exploit 29 zero-days on second day of Pwn2Own Automotive Malicious AI extensions on VSCode Marketplace steal developer data CISA confirms active exploitation of four enterprise software bugs US to deport Venezuelans who emptied bank ATMs using malware Hackers exploit critical telnetd auth bypass flaw to get root Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityMalicious AI extensions on VSCode Marketplace steal developer data Malicious AI extensions on VSCode Marketplace steal developer data By Bill Toulas January 23, 2026 Two malicious extensions in Microsoft’s Visual Studio Code (VSCode) Marketplace that were collectively installed 1.5 million times exfiltrate developer data to China-based servers. Researchers at endpoint and supply-chain security company Koi say that the two malicious extensions are part of a campaign they dubbed 'MaliciousCorgi' and share the same code for stealing developer data. Malicious extension on the VSCode marketplaceSource: BleepingComputer Function that performs the file theftSource: Koi Security Exfiltrating up to 50 files from the workspaceSource: Koi Security Secrets Security Cheat Sheet: From Sprawl to Control Related Articles: AI Bill Toulas Previous Article Post a Comment Community Rules You need to login in order to post a comment You may also like: Popular Stories Fortinet admins report patched FortiGate firewalls getting hacked Hackers breach Fortinet FortiGate devices, steal firewall configs Zendesk ticket systems hijacked in massive global spam wave Sponsor Posts Overdue a password health-check? Audit your Active Directory for free Discover how phishing kits are sold and deployed. Download the full research report. Exposure Management Index: Insights From 3,000+ Teams. Get The Report. Identity Governance & Threat Detection in one: Get a guided tour of our platform Upcoming Webinar Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
The proliferation of malicious AI extensions within the Visual Studio Code (VSCode) Marketplace represents a significant and concerning security vulnerability. Koi Security researchers discovered two extensions, “ChatGPT – 中文版” and “ChatMoss (CodeMoss),” that amassed a combined 1.5 million installations and were covertly exfiltrating developer data to China-based servers. These extensions, deceptively advertised as AI-powered coding assistants, employed a sophisticated three-pronged data collection strategy. Firstly, they engaged in real-time monitoring of all files opened within the VSCode client, encoding the entire contents into Base64 and transmitting them to the attackers’ servers. Secondly, they utilized a server-controlled command to harvest up to 50 files from the developer’s workspace with each transmission. Thirdly, they integrated four commercial analytics SDKs – Zhuge.io, GrowingIO, TalkingData, and Baidu Analytics – to build user identity profiles, track behavior, and fingerprint devices. The potential consequences of this activity include exposure of sensitive source code, configurations, cloud service credentials, and API keys. The widespread availability of these extensions within the popular VSCode Marketplace underscores the need for heightened vigilance and security practices among developers. Koi Security’s investigation highlighted the critical importance of scrutinizing the functionality of third-party extensions, particularly those with vague descriptions and undisclosed data collection activities. As of the report’s publication, Microsoft had not responded to BleepingComputer’s inquiry regarding the presence of these malicious extensions in the Marketplace, further amplifying concerns about the platform’s security oversight. The incident serves as a stark reminder of the evolving threat landscape and the potential for seemingly benign tools to be exploited for malicious purposes. This highlights the demand for enhanced security practices by developers, including careful evaluation of extensions and diligent protection of sensitive information. The use of Base64 encoding and integration with commercial analytics SDKs significantly increased the attack surface and facilitated detailed profiling of developers. The lack of communication from the extension publishers adds to this concern. Overall, the “MaliciousCorgi” campaign represents a dangerous trend in the expansion of AI-powered tools and the need for greater security controls within the VSCode ecosystem. The report stresses critical vulnerabilities of third-party supply chain components, where developers can be inadvertently exposed to sophisticated data extraction techniques, highlighting the need for increased security awareness and comprehensive due diligence processes. |