Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft VS Code Remote-SSH Extension Hacked to Execute Malicious Code on Developer’s Machine

Microsoft VS Code Remote-SSH Extension Hacked to Execute Malicious Code on Developer’s Machine

Posted on August 21, 2025August 21, 2025 By CWS

A important safety vulnerability has been found in Microsoft’s VS Code Distant-SSH extension that permits attackers to execute malicious code on builders’ native machines via compromised distant servers. 

Safety researchers have demonstrated how this assault, dubbed “Vibe Hacking,” exploits the inherent belief relationship between distant improvement environments and native machines, affecting each VS Code and well-liked forks like Cursor.

The vulnerability stems from a harmful false impression amongst builders who consider distant improvement environments present full isolation. 

Key Takeaways1. VS Code Distant-SSH extension permits attackers to execute malicious code on builders’ native machines.2. Attackers use built-in instructions to open native terminals and mechanically run arbitrary code.3. Exposing their workstations to compromise when connecting to untrusted servers.

Nevertheless, as soon as a server is compromised, attackers can simply pivot to the developer’s native machine via the Distant-SSH extension’s built-in performance.

Exploiting Constructed-in Instructions

Calif reviews that the assault leverages two particular VS Code instructions that function throughout the default configuration settings. 

Malicious extensions on compromised servers can execute the workbench.motion.terminal.newLocal command to open a terminal instantly on the developer’s native machine, bypassing the distant setting totally.

Assault Chain

As soon as the native terminal is established, attackers deploy the workbench.motion.terminal.sendSequence command to ship arbitrary textual content sequences to the terminal. 

By appending a newline character, the malicious code executes mechanically as if the developer pressed Enter. This method successfully transforms the trusted improvement setting right into a command and management channel, reads the report.

The assault works seamlessly as a result of the Distant-SSH extension inherently trusts communications from the distant server. 

When builders hook up with what they consider is an remoted sandbox setting, they unknowingly expose their native machines to potential compromise.

Mitigation Methods

Microsoft has acknowledged these dangers on the Distant-SSH extension market web page, warning that “a compromised distant might use the VS Code Distant connection to execute code in your native machine”. 

Nevertheless, this warning has not prevented widespread adoption of distant improvement practices, notably for AI agent deployment and testing.

Safety researchers counsel implementing consumer approval mechanisms when distant extensions try and open native terminals or ship keystrokes to energetic terminals. 

Monitoring the ~/.cursor-server listing for unauthorized modifications can present restricted safety, although this method provides minimal safety if servers are absolutely compromised.

The vulnerability highlights the necessity for secure-by-default designs in improvement instruments that don’t depend on customers making advanced belief selections. 

As distant improvement continues rising in reputation, addressing these basic safety points turns into more and more important for shielding developer workstations from refined provide chain assaults.

Safely detonate suspicious recordsdata to uncover threats, enrich your investigations, and minimize incident response time. Begin with an ANYRUN sandbox trial → 

Cyber Security News Tags:Code, Developers, Execute, Extension, Hacked, Machine, Malicious, Microsoft, RemoteSSH

Post navigation

Previous Post: Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft
Next Post: Apple Patches Zero-Day Exploited in Targeted Attacks

Related Posts

Best Network Security Solutions for CSO Best Network Security Solutions for CSO Cyber Security News
Cornwell Quality Tools Data Breach Cornwell Quality Tools Data Breach Cyber Security News
Shanya EDR Killer Leveraged by Hackers to Clear the Way for Ransomware Infection Shanya EDR Killer Leveraged by Hackers to Clear the Way for Ransomware Infection Cyber Security News
X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-grade AES-256 Encryption X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-grade AES-256 Encryption Cyber Security News
Threat Actors Leveraging compromised RDP Logins to Deploy Lynx Ransomware After Deleting Server Backups Threat Actors Leveraging compromised RDP Logins to Deploy Lynx Ransomware After Deleting Server Backups Cyber Security News
Microsoft Teams New Premium Feature Blocks Screenshots and Recordings During Meeting Microsoft Teams New Premium Feature Blocks Screenshots and Recordings During Meeting Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News