ransomware infiltrates vscode extensions

While Microsoft has been busy promoting its AI tools, hackers were quietly slipping ransomware into the VSCode Marketplace. Security researchers recently uncovered two malicious extensions – “ahban.shiba” and “ahban.cychelloworld” – that managed to evade detection for months. Great job, security team.

The extensions, uploaded on October 27, 2024, and February 17, 2025, were downloaded a combined 15 times before removal. Not exactly viral, but enough to cause damage. They worked by executing a PowerShell script that downloaded ransomware code targeting specific directories on victims’ machines. The ransomware specifically targeted files in C:users%username%DesktopestShiba. Once active, the ransomware encrypted files and demanding payment of “1 ShibaCoin” – with zero instructions on how to actually pay. Amateur hour, apparently.

Microsoft’s response? Remove the extensions and apologize. They admitted to “gaps” in their review process – corporate speak for “we messed up.” Funny how they can build fancy AI assistants but can’t spot basic malware in their own marketplace.

Microsoft can build AI tools that change the world but can’t detect ransomware hiding in plain sight.

This isn’t Microsoft’s first rodeo with malicious extensions. The past year has seen multiple instances of extensions stealing sensitive information or serving as downloaders for more dangerous payloads. The pattern is clear. The vigilance is not.

The incident exposes critical vulnerabilities in Microsoft’s ecosystem. Developers install extensions with blind trust, assuming the marketplace’s gatekeepers are doing their job. They’re not. This issue is compounded by VSCode’s lack of permission management for installed extensions. These attacks mimic techniques seen with npm packages, showing how attackers are adapting their strategies across different platforms. Small businesses are especially vulnerable, with zero trust architecture becoming increasingly essential for protection against such supply chain attacks.

For Microsoft, this represents yet another blow to their security reputation. While they’re promising improved scanners and better investigation processes, their track record doesn’t inspire confidence. The VSCode Marketplace is becoming an attractive target for malicious actors, joining the growing list of software supply chain vulnerabilities.

Small extensions, big problems. Microsoft needs to do better. Developers deserve better protection than “oops, we’ll try harder next time.”

You May Also Like

Extradited LockBit Developer Faces Justice in New Jersey After Alleged Cybercrime Spree

LockBit’s critical developer faces 41 charges with $500M in digital heists across 2,500 victims. His capture exposes the terrifying reach of ransomware’s deadliest operation. Justice finally arrives.

Fortinet’s Flawed Security: Ransomware Surge From Two Exploited Vulnerabilities

Fortinet’s fatal security flaws trigger ransomware epidemic across 150,000 vulnerable systems. Security products became secret backdoors for attackers. Your organization might be next.

Freshly Unleashed VanHelsing Ransomware Sets Its Sights on Windows and ESXi Systems

New menace VanHelsing ransomware demands $500K, evades detection with “Silent Mode,” and encrypts with ruthless efficiency. Government agencies and corporations are already falling victim. Their $10K/hour toll is just the beginning.

Ransomware Crisis Escalates: February 2025 Sees Unprecedented 126% Surge in Attacks!

Ransomware apocalypse strikes: 126% surge in attacks bankrupts 60% of victims within months. AI-powered criminals now hijack webcams to spy on networks while demanding record-breaking $5.2 million ransoms. Your business could be next.