Malicious VS Code Extensions With 1.5 Million Installs Steal Developer Source Code

2 Sources

Share

Cybersecurity researchers uncovered two malicious VS Code extensions disguised as AI-powered coding assistants that secretly exfiltrated developer source code to China-based servers. ChatGPT - 中文版 and ChatMoss, with 1.5 million combined installs, remain available on the Visual Studio Marketplace despite actively stealing files and tracking user behavior through hidden mechanisms.

Malicious VS Code Extensions Expose Developer Source Code to Chinese Servers

Cybersecurity researchers at Koi Security have identified two malicious VS Code extensions that masquerade as AI-powered coding assistants while secretly exfiltrating developer source code to servers in China

1

. The extensions—ChatGPT - 中文版 with 1,340,869 installs and ChatMoss (CodeMoss) with 151,751 installs—remain available for download from the official Visual Studio Marketplace despite their malicious activity

1

. This discovery matters significantly for developers worldwide who rely on VS Code extensions to enhance productivity, as the tools function exactly as advertised while simultaneously conducting surveillance operations.

Source: Hacker News

Source: Hacker News

MaliciousCorgi Campaign Operates Through Three Distinct Data Exfiltration Methods

The MaliciousCorgi campaign employs sophisticated techniques to siphon developer source code without raising suspicion

2

. Security researcher Tuval Admoni from Koi Security noted that both extensions contain identical malicious code running under different publisher names

1

. The first mechanism activates the moment a user opens any file in VS Code, reading the entire contents, encoding it in Base64 format, and transmitting it to aihao123[.]cn, a server located in China

1

. This process triggers for every edit, creating continuous data exfiltration as developers work.

Source: TechRadar

Source: TechRadar

The second method involves real-time monitoring that can be remotely activated by the server, enabling the extraction of up to 50 files from the workspace

1

. The third mechanism deploys hidden iframes—zero-pixel iframes embedded in the extension's web view that load four commercial analytics SDKs: Zhuge.io, GrowingIO, TalkingData, and Baidu Analytics

1

. These analytics SDKs enable device fingerprinting and create extensive user profiles for user behavior tracking

2

.

Functional Extensions Lower Developer Suspicion While Stealing Sensitive Data

What makes these malicious Microsoft VSCode AI extensions particularly dangerous is their legitimate functionality. Both tools provide autocomplete suggestions and explain coding errors as promised, effectively avoiding detection while exfiltrated sensitive user data flows to servers in China

1

2

. This dual-purpose design means developers receive genuine value from the extensions while unknowingly exposing proprietary code, intellectual property, and potentially sensitive client information. Microsoft told BleepingComputer it was investigating the situation, but the extensions remained available for download at the time of reporting.

PackageGate Flaws Compound Supply Chain Security Concerns

Koi Security also disclosed six zero-day vulnerabilities in JavaScript package managers including npm, pnpm, vlt, and Bun, collectively named PackageGate Flaws

1

. These vulnerabilities allow attackers to bypass security controls designed to prevent automatic execution of lifecycle scripts during package installation, undermining defenses against supply chain attacks

1

. While pnpm addressed the issues in version 10.26.0 (tracking them as CVE-2025-69264 with a CVSS score of 8.8 and CVE-2025-69263 with a CVSS score of 7.5), vlt patched in version 1.0.0-rc.10, and Bun fixed them in version 1.3.5, npm declined to address the vulnerability

1

. Security researcher Oren Yomtov cautioned that "until PackageGate is fully addressed, organizations need to make their own informed choices about risk"

1

. Developers should watch for Visual Studio Marketplace policy changes and consider implementing additional vetting processes for extensions, particularly those offering AI assistance, as the intersection of convenience and security continues to present challenges in the development ecosystem.🟡 untrained:

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2026 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo