Malicious VS Code extensions: what developers need to know now
Blog|by Leanne Bevan|12 December 2025

How attackers hid malware in plain sight
Bitcoin Black, marketed as a “premium dark theme”, triggered code execution every time VS Code launched - thanks to the * activation event. Even more suspicious? It could run PowerShell scripts, something no theme should ever need.
This is a prime example of how malicious VS Code extensions can exploit activation events to run scripts.
Codo AI, one of the malicious VS Code extensions, offered genuine functionality via ChatGPT and DeepSeek. But behind the scenes, it concealed malicious code, making detection far harder.
The initial payload used PowerShell and a password-protected ZIP. Later, attackers switched to a stealthy batch script (.bat.sh) that silently fetched two things:
- Lightshot.exe (a legitimate screenshot tool)
- A malicious DLL
Inside the attack: how data was stolen
Once installed, the extension paired Lightshot.exe with the DLL using DLL hijacking. From there, the infostealer went to work:
- Capturing screenshots, clipboard data, running processes, installed programmes, and Wi‑Fi credentials
- Harvesting browser cookies and hijacking sessions by launching Chrome and Edge in headless mode
- Stealing crypto wallet details from MetaMask, Phantom, Exodus, and others
Stolen data was stored in %APPDATA%\Local\Evelyn, with a mutex (a system lock) to prevent duplicates. The DLL was flagged by 29 out of 7. antivirus engines on VirusTotal.
What happened - and what you should do now
The good news? Both extensions had low download counts - Bitcoin Black had just one install, and Codo AI fewer than 30. Microsoft acted fast, removing Bitcoin Black on 5 December and Codo AI on 8 December, along with a similar malicious theme called BigBlack.mrbigblacktheme.
But this isn’t an isolated case. Malicious VS Code extensions are part of a growing trend: supply-chain attacks targeting trusted developer tools.
This incident is part of a larger trend where attackers exploit trusted developer tools as malware conduits. Similar attacks include:
- GlassWorm, injecting infostealers into VS Code and Open VSX extensions
- A fake Prettier formatter delivering a remote access trojan (RAT)
- Icon themes hiding Rust-based implants
These examples show why vigilance matters. IDE extensions are becoming prime targets for social engineering and malware delivery.
Your safety checklist
To protect your development environment:
- Install extensions only from reputable publishers
- Check activation events - themes should only use JSON files, not scripts
- Monitor for unusual behaviour, like unexpected network calls or processes
Optimise your security
Want to safeguard your development pipeline? Book a free Seven Layers of Security Assessment with our cyber security team. Find gaps in your security and discover the best ways to remediate them. We’ll help you find gaps and provide recommendations on how to strengthen your defences. For instance, with tools like static code analysis, app monitoring, and encryption.
Sources:
- https://www.bleepingcomputer.com/news/security/malicious-vscode-extensions-on-microsofts-registry-drop-infostealers/
- https://cybernews.com/security/microsoft-vscode-malicious-extensions/
- https://www.infosecurity-magazine.com/news/malicious-vs-code-extensions/
- https://cyberpress.org/microsoft-registry-vulnerability/
- https://visualstudiomagazine.com/articles/2025/12/08/threat-actors-keep-weaponizing-vs-code-extensions.aspx
Contact Grey Matter
If you have any questions or want some extra information, complete the form below and one of the team will be in touch ASAP. If you have a specific use case, please let us know and we'll help you find the right solution faster.
By submitting this form you are agreeing to our Privacy Policy and Website Terms of Use.
Author
Leanne Bevan
Vendor Marketing Manager at Grey Matter
Leanne has been part of our team for over a decade, and has worked as a vendor marketing manager for a number of our key vendors. Now with a keen focus on cyber security as well as developer technologies, Leanne continues to manage marketing across several vendors, including Embarcadero, Acronis, ESET, and more.
Related News
We’re now a Kiteworks reseller partner
We’re excited to announce that we’re now a Kiteworks reseller partner to help you improve your file sync and sharing experiences, as well as improve security best practices. “Having Kiteworks as a partner enables us to deliver secure, enterprise-grade Managed File Transfer, File Share and Collaboration, and...
See you at the International Cyber Expo
Tue 29 September 2026 - Tue 30 June 2026 10:00 am - 5:00 pm BST
We’re exhibiting at the International Cyber Expo We’re excited to share that we’ve got stand at the International Cyber Expo at Olympia, London, for the very first time. 29-30 September 2026. You’ll find us on stand K60, where our team will be ready...
We’re returning as a gold sponsor at Agile on the Beach 2026
Agile on the Beach is where businesses come together to learn, share and move forward on their Agile journey. Agile methodologies. A community of thought leaders. Workshops with practical applications. You don’t want to miss out. We’re proud to be returning as a Gold sponsor for Agile on the...
The invisible scar: Why ransomware is a mental health crisis, not just a financial one
When a ransomware attack hits the news, the headlines are almost always dominated by the “big numbers”: a £5 million ransom demand, a 40% drop in stock price, or the multi-million-pound cost of system restoration. While these figures are staggering, they...