Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack

Posted on July 9, 2025July 9, 2025 By CWS

A complicated provide chain assault has compromised ETHcode, a well-liked Visible Studio Code extension for Ethereum improvement, by means of a malicious GitHub pull request that required simply two strains of code to weaponize the trusted software program.

The assault, found by ReversingLabs researchers, demonstrates how menace actors can infiltrate professional improvement instruments with minimal code adjustments, doubtlessly affecting 1000’s of cryptocurrency builders worldwide.

The compromise started on June 17, 2025, when a person named Airez299 submitted a GitHub pull request to the ETHcode mission with the seemingly benign message, “Modernize codebase with viem integration and testing framework.”

ETHcode, developed by 7finney group, is a professional VS Code extension with almost 6,000 person installations that permits Ethereum builders to check, debug, and deploy sensible contracts throughout EVM-based blockchains.

The malicious pull request appeared extremely helpful at first look, claiming so as to add new options, take away outdated configurations, and modernize the codebase.

weaponized extension

The submission was significantly convincing as a result of the ETHcode mission had been dormant for greater than six months, with its final professional replace occurring on September 6, 2024.

Each human reviewers from the 7finney group and GitHub’s Copilot AI reviewer examined the code and located nothing suspicious, approving the adjustments after requesting minor modifications.

Technical Evaluation of the Two-Line Assault

Hidden inside 43 commits and roughly 4,000 strains of modified code have been two essential strains that will compromise your complete extension.

The primary line launched a brand new dependency known as “keythereum-utils,” cleverly named to look as a professional helper library for the prevailing “keythereum” package deal already utilized by the mission.

This naming conference was designed to lift minimal suspicion amongst reviewers. The second line of malicious code invoked Node.js’s “require” operate to load and execute the newly launched dependency.

When researchers analyzed the keythereum-utils package deal, they found closely obfuscated JavaScript code that, when deobfuscated, revealed its true goal: spawning a hidden PowerShell course of that downloads and executes a batch script from a public file-hosting service.

The assault’s effectiveness was amplified by VS Code’s automated extension replace characteristic, which suggests the malicious code was robotically distributed to almost 6,000 customers with out their data.

Malicious Code

ReversingLabs researchers promptly notified Microsoft’s Visible Studio Market directors in regards to the discovery, ensuing within the full removing of the compromised extension from {the marketplace} by June 26.

The extension’s creator at 7finney has since issued a corrective replace, with ETHcode model 0.5.1 printed on July 1st, eradicating the malicious dependency and restoring the extension to {the marketplace}.

Nonetheless, researchers are nonetheless investigating the second-stage payload’s precise capabilities, although given the crypto-focused nature of the goal, it seemingly goals to steal cryptocurrency belongings or compromise Ethereum sensible contracts below improvement.

This incident highlights essential vulnerabilities in trendy software program improvement workflows.

The assault succeeded regardless of a number of layers of evaluate as a result of the Airez299 account was created particularly for this goal on the identical day because the pull request, with no earlier historical past or exercise.

The compromise demonstrates that even trusted, professional software program could be weaponized by means of minimal code adjustments, making provide chain assaults an more and more critical menace to the event group.

MSSP Pricing Information:  Minimize By means of the Noise and the Hidden Value-> Get Your Free Information

Cyber Security News Tags:Attack, Chain, Code, Extension, Leads, Lines, Supply, Weaponized

Post navigation

Previous Post: DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware
Next Post: Microsoft Patches Wormable RCE Vulnerability in Windows and Windows Server

Related Posts

10 Best ZTNA Solutions (Zero Trust Network Access) in 2025 Cyber Security News
Windows User Account Control Bypassed Using Character Editor to Escalate Privileges Cyber Security News
Warlock Ransomware Exploiting SharePoint Vulnerabilities to Gain Access and Steal Credentials Cyber Security News
Hackers Exploit Legitimate Inno Setup Installer to Use as a Malware Delivery Vehicle Cyber Security News
Lighthouse Studio RCE Vulnerability Let Attackers Gain Access to Hosting Servers Cyber Security News
Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How SOCs Triage Incidents in Seconds with Threat Intelligence
  • Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775
  • New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station
  • First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption
  • New Attack Targeting ScreenConnect Cloud Administrators to Steal Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How SOCs Triage Incidents in Seconds with Threat Intelligence
  • Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775
  • New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station
  • First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption
  • New Attack Targeting ScreenConnect Cloud Administrators to Steal Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News