ransomware infiltrates vscode extensions

While Microsoft has been busy promoting its AI tools, hackers were quietly slipping ransomware into the VSCode Marketplace. Security researchers recently uncovered two malicious extensions – “ahban.shiba” and “ahban.cychelloworld” – that managed to evade detection for months. Great job, security team.

The extensions, uploaded on October 27, 2024, and February 17, 2025, were downloaded a combined 15 times before removal. Not exactly viral, but enough to cause damage. They worked by executing a PowerShell script that downloaded ransomware code targeting specific directories on victims’ machines. The ransomware specifically targeted files in C:users%username%DesktopestShiba. Once active, the ransomware encrypted files and demanding payment of “1 ShibaCoin” – with zero instructions on how to actually pay. Amateur hour, apparently.

Microsoft’s response? Remove the extensions and apologize. They admitted to “gaps” in their review process – corporate speak for “we messed up.” Funny how they can build fancy AI assistants but can’t spot basic malware in their own marketplace.

Microsoft can build AI tools that change the world but can’t detect ransomware hiding in plain sight.

This isn’t Microsoft’s first rodeo with malicious extensions. The past year has seen multiple instances of extensions stealing sensitive information or serving as downloaders for more dangerous payloads. The pattern is clear. The vigilance is not.

The incident exposes critical vulnerabilities in Microsoft’s ecosystem. Developers install extensions with blind trust, assuming the marketplace’s gatekeepers are doing their job. They’re not. This issue is compounded by VSCode’s lack of permission management for installed extensions. These attacks mimic techniques seen with npm packages, showing how attackers are adapting their strategies across different platforms. Small businesses are especially vulnerable, with zero trust architecture becoming increasingly essential for protection against such supply chain attacks.

For Microsoft, this represents yet another blow to their security reputation. While they’re promising improved scanners and better investigation processes, their track record doesn’t inspire confidence. The VSCode Marketplace is becoming an attractive target for malicious actors, joining the growing list of software supply chain vulnerabilities.

Small extensions, big problems. Microsoft needs to do better. Developers deserve better protection than “oops, we’ll try harder next time.”

You May Also Like

How Medusa Ransomware Turns Malicious Drivers Into Undetectable EDR Killers

Even your trusted cybersecurity tools are secretly failing you—Medusa ransomware transforms innocent drivers into lethal weapons that silence defense systems before you know they’re compromised. Your organization could be next.

Spearwing Raas Group Escalates Cyber Warfare With Medusa Ransomware Surge

Russian hackers expand their criminal empire while competitors falter. Spearwing’s Medusa ransomware quietly doubled attacks in 2025, demanding up to $15 million from victims. Your organization could be next.

Fortinet Flaw Unleashes Ransomware Chaos as CISA Sounds the Alarm in January

CISA’s desperate January alarm: Fortinet flaws grant hackers super-admin access, unleashing LockBit ransomware on 12,000+ US and India firewalls. Your defenses might already be compromised.

Ransomware Crisis Escalates: February 2025 Sees Unprecedented 126% Surge in Attacks!

Ransomware apocalypse strikes: 126% surge in attacks bankrupts 60% of victims within months. AI-powered criminals now hijack webcams to spy on networks while demanding record-breaking $5.2 million ransoms. Your business could be next.