Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack

Posted on July 9, 2025July 9, 2025 By CWS

A complicated provide chain assault has compromised ETHcode, a well-liked Visible Studio Code extension for Ethereum improvement, by means of a malicious GitHub pull request that required simply two strains of code to weaponize the trusted software program.

The assault, found by ReversingLabs researchers, demonstrates how menace actors can infiltrate professional improvement instruments with minimal code adjustments, doubtlessly affecting 1000’s of cryptocurrency builders worldwide.

The compromise started on June 17, 2025, when a person named Airez299 submitted a GitHub pull request to the ETHcode mission with the seemingly benign message, “Modernize codebase with viem integration and testing framework.”

ETHcode, developed by 7finney group, is a professional VS Code extension with almost 6,000 person installations that permits Ethereum builders to check, debug, and deploy sensible contracts throughout EVM-based blockchains.

The malicious pull request appeared extremely helpful at first look, claiming so as to add new options, take away outdated configurations, and modernize the codebase.

weaponized extension

The submission was significantly convincing as a result of the ETHcode mission had been dormant for greater than six months, with its final professional replace occurring on September 6, 2024.

Each human reviewers from the 7finney group and GitHub’s Copilot AI reviewer examined the code and located nothing suspicious, approving the adjustments after requesting minor modifications.

Technical Evaluation of the Two-Line Assault

Hidden inside 43 commits and roughly 4,000 strains of modified code have been two essential strains that will compromise your complete extension.

The primary line launched a brand new dependency known as “keythereum-utils,” cleverly named to look as a professional helper library for the prevailing “keythereum” package deal already utilized by the mission.

This naming conference was designed to lift minimal suspicion amongst reviewers. The second line of malicious code invoked Node.js’s “require” operate to load and execute the newly launched dependency.

When researchers analyzed the keythereum-utils package deal, they found closely obfuscated JavaScript code that, when deobfuscated, revealed its true goal: spawning a hidden PowerShell course of that downloads and executes a batch script from a public file-hosting service.

The assault’s effectiveness was amplified by VS Code’s automated extension replace characteristic, which suggests the malicious code was robotically distributed to almost 6,000 customers with out their data.

Malicious Code

ReversingLabs researchers promptly notified Microsoft’s Visible Studio Market directors in regards to the discovery, ensuing within the full removing of the compromised extension from {the marketplace} by June 26.

The extension’s creator at 7finney has since issued a corrective replace, with ETHcode model 0.5.1 printed on July 1st, eradicating the malicious dependency and restoring the extension to {the marketplace}.

Nonetheless, researchers are nonetheless investigating the second-stage payload’s precise capabilities, although given the crypto-focused nature of the goal, it seemingly goals to steal cryptocurrency belongings or compromise Ethereum sensible contracts below improvement.

This incident highlights essential vulnerabilities in trendy software program improvement workflows.

The assault succeeded regardless of a number of layers of evaluate as a result of the Airez299 account was created particularly for this goal on the identical day because the pull request, with no earlier historical past or exercise.

The compromise demonstrates that even trusted, professional software program could be weaponized by means of minimal code adjustments, making provide chain assaults an more and more critical menace to the event group.

MSSP Pricing Information:  Minimize By means of the Noise and the Hidden Value-> Get Your Free Information

Cyber Security News Tags:Attack, Chain, Code, Extension, Leads, Lines, Supply, Weaponized

Post navigation

Previous Post: DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware
Next Post: Microsoft Patches Wormable RCE Vulnerability in Windows and Windows Server

Related Posts

RDP vs SSH Comparison – Features, Protocols, Security, And Use Cases Cyber Security News
New GitHub Device Code Phishing Attacks Targeting Developers to Steal Tokens Cyber Security News
SolarWinds Web Help Desk Vulnerability Enables Unauthenticated RCE Cyber Security News
Critical Trend Micro Apex One Management RCE Vulnerability Actively Exploited in the wild Cyber Security News
Lessons Learned from Massive npm Supply Chain Attack Using “Shai-Hulud” Self-Replicating Malware Cyber Security News
New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Oracle Patches EBS Vulnerability Allowing Access to Sensitive Data
  • Spanish Authorities Dismantle ‘GXC Team’ Crime-as-a-Service Operation
  • Extortion Group Leaks Millions of Records From Salesforce Hacks
  • Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns
  • New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Oracle Patches EBS Vulnerability Allowing Access to Sensitive Data
  • Spanish Authorities Dismantle ‘GXC Team’ Crime-as-a-Service Operation
  • Extortion Group Leaks Millions of Records From Salesforce Hacks
  • Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns
  • New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News