Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data

Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data

Posted on December 9, 2025December 9, 2025 By CWS

Dec 09, 2025Ravie LakshmananMalware / Menace Evaluation
Cybersecurity researchers have found two new extensions on Microsoft Visible Studio Code (VS Code) Market which can be designed to contaminate developer machines with stealer malware.
The VS Code extensions masquerade as a premium darkish theme and a synthetic intelligence (AI)-powered coding assistant, however, really, harbor covert performance to obtain extra payloads, take screenshots, and siphon information. The captured data is then despatched to an attacker-controlled server.
“Your code. Your emails. Your Slack DMs. No matter’s in your display screen, they’re seeing it too,” Koi Safety’s Idan Dardikman mentioned. “And that is simply the beginning. It additionally steals your WiFi passwords, reads your clipboard, and hijacks your browser classes.”

The names of the extensions are beneath –

BigBlack.bitcoin-black (16 installs) – Eliminated by Microsoft on December 5, 2025
BigBlack.codo-ai (25 installs) – Eliminated by Microsoft on December 8, 2025

Microsoft’s checklist of eliminated extensions from the Market exhibits that the corporate additionally eliminated a 3rd package deal named “BigBlack.mrbigblacktheme” from the identical writer for holding malware.
Whereas “BigBlack.bitcoin-black” prompts on each VS Code motion, Codo AI embeds its malicious performance inside a working software, thereby permitting it to bypass detection.
Earlier variations of the extensions got here with the power to execute a PowerShell script to obtain a password-protected ZIP archive from an exterior server (“syn1112223334445556667778889990[.]org”) and extract from it the primary payload utilizing 4 totally different strategies: Home windows native Increase-Archive, .NET System.IO.Compression, DotNetZip, and 7-Zip (if put in).

That mentioned, the attacker is alleged to have inadvertently shipped a model that created a visual PowerShell window and will have alerted the person. Subsequent iterations, nevertheless, have been discovered to cover the window and streamline your complete course of by switching to a batch script that makes use of a curl command to obtain the executable and DLL.
The executable is the respectable Lightshot binary that is used to load the rogue DLL (“Lightshot.dll”) through DLL hijacking, which proceeds to collect clipboard contents, a listing of put in apps, operating processes, desktop screenshots, saved Wi-Fi credentials, and detailed system data. It additionally launches Google Chrome and Microsoft Edge in headless mode to seize saved cookies and hijack person classes.
“A developer might set up what seems to be like a innocent theme or a helpful AI software, and inside seconds their WiFi passwords, clipboard contents, and browser classes are being exfiltrated to a distant server,” Dardikman mentioned.

The disclosure comes as Socket mentioned it recognized malicious packages throughout the Go, npm, and Rust ecosystems which can be able to harvesting delicate information –

Go packages named “github[.]com/bpoorman/uuid” and “github[.]com/bpoorman/uid” which have been accessible since 2021 and typosquat trusted UUID libraries (“github[.]com/google/uuid” and “github[.]com/pborman/uuid”) to exfiltrate information to a paste website known as dpaste when an utility explicitly invokes a supposed helper perform named “legitimate” together with the knowledge to be validated.
A set of 420 distinctive npm packages revealed by a possible French-speaking menace actor that follows a constant naming sample together with “elf-stats-*,” a few of which include code to execute a reverse shell and exfiltrate information to a Pipedream endpoint.
A Rust crate named finch-rust revealed by faceless, that impersonates the respectable bioinformatics software “finch” and serves as a loader for a malicious payload by a credential-stealing package deal often called “sha-rust” when a developer makes use of the library’s sketch serialization performance.

“Finch-rust acts as a malware loader; it accommodates largely respectable code copied from the respectable finch package deal however features a single malicious line that masses and executes the sha-rust payload,” Socket researcher Kush Pandya mentioned. “This separation of issues makes detection tougher: finch-rust seems to be benign in isolation, whereas sha-rust accommodates the precise malware.”

The Hacker News Tags:Code, Data, Developer, Find, Malicious, NPM, Packages, Researchers, Rust, Stealing

Post navigation

Previous Post: Fix for Critical Vulnerabilities in SAP Solution Manager, NetWeaver, and Other Products
Next Post: Operation FrostBeacon Attacking Finance and Legal Departments with Cobalt Strike Malware

Related Posts

Germany Shuts Down eXch Over .9B Laundering, Seizes €34M in Crypto and 8TB of Data Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data The Hacker News
Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider The Hacker News
Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More The Hacker News
Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers The Hacker News
Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More The Hacker News
BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News