Australia Times

United, Strong, and Free
Sunday, Jan 18, 2026

Hackers Are Hiding Malware in Open-Source Tools and IDE Extensions

The common belief that “open source is safe because everyone can inspect the code” is misleading. In reality, most open-source projects include add-ons and components that are not open source at all — and these hidden parts can easily contain spyware, malware, and viruses. Once installed, they can take over both the user’s computer and the servers running the so-called open-source code, giving hackers full control to do whatever they want.

A newly uncovered cyberattack—one of the most sophisticated developer-focused campaigns seen in recent years—is weaponizing the daily workflow of software engineers. 

Security companies have revealed a malicious operation in which attackers insert stealthy malware into seemingly harmless extensions and open-source tools used by tens of thousands of developers worldwide. 

These extensions appear completely legitimate, yet silently exfiltrate highly sensitive data such as passwords, Wi-Fi access credentials, authentication tokens, clipboard contents, and even live screenshots taken directly from developers’ machines.


Compromised VS Code Extensions: “Bitcoin Black” and “Codo AI”

Two Visual Studio Code extensions were confirmed to contain embedded malicious components: the Bitcoin Black theme and an AI assistant tool called Codo AI. Both extensions looked fully legitimate on the marketplace and performed their advertised functions, which helped them evade suspicion and achieve wide adoption.

Once installed, the extensions deployed an additional malicious payload that continuously harvested data from infected devices. The threat actors were not content with collecting passwords alone. The malware captured real-time screenshots of developers’ screens—revealing source code, Slack discussions, credentials, internal documentation, and confidential project directories.

This level of visibility allows attackers to map entire workflows, understand sensitive architectures, and target organizations with precision.


The Attack Technique: DLL Hijacking as a Delivery Vehicle

The operation relied on an advanced method known as DLL hijacking, which abuses the way legitimate software loads system libraries.

The attackers downloaded a real, benign screenshot tool (Lightshot) onto the victim’s machine, pairing it with a malicious DLL that carried the same filename as the tool’s expected library. When Lightshot launched, it automatically loaded the attacker’s counterfeit DLL. This triggered the malware’s execution without raising suspicion.

Security researchers found that the malware collected:

  • Continuous screenshots and clipboard data

  • Wi-Fi passwords and saved wireless credentials

  • Browser cookies, authentication tokens, and active sessions (via Chrome and Edge in headless mode)

  • Information about installed software, running processes, and development tools

Koi Security reports that the attackers have been iterating and improving the operation, increasingly using “clean” and innocuous-looking scripts to blend in with normal developer activity.


The Campaign Is Spreading Beyond VS Code

While the first findings emerged in VS Code, similar malicious injections are now appearing across the broader open-source ecosystem:

  • npm and Go: Malware packages imitating the names of popular, trusted libraries

  • Rust: A library called finch-rust masqueraded as a scientific computation tool, but instead loaded an additional malware component called sha-rust

This reflects a direct attack on the software supply chain—the trust mechanism developers rely on when importing packages, extensions, or dependencies. By compromising tools that sit at the heart of software development, attackers gain privileged access to entire organizations.


Why This Threat Is So Dangerous

A single developer installing one benign-looking extension can unknowingly trigger a breach across the entire company:

  • Theft of core, proprietary source code

  • Takeover of GitHub and other cloud development accounts

  • Infection of CI/CD pipelines and build environments

  • Exposure of sensitive customer data, credentials, and internal architecture

Because development environments are privileged by design—holding secrets, tokens, SSH keys, and code—the blast radius of compromise is enormous.

Traditional static code scanning is insufficient for detecting these attacks. The extensions themselves often appear legitimate or include harmless code alongside hidden payloads. What is required is real-time behavioral monitoringcapable of flagging anomalous actions—such as a theme extension attempting to access stored passwords.


Recommended Security Measures for Developers and Organizations

To reduce exposure, cybersecurity firms recommend the following defensive steps:

  1. Enable multi-factor authentication on all development accounts, including GitHub, GitLab, cloud providers, and CI/CD tools.

  2. Verify the identity and reputation of extension publishers before installation.

  3. Avoid anonymous, poorly reviewed, or unknown plugins—even if they appear harmless.

  4. Adopt security tools that include behavioral detection, not only static scanning.

  5. Treat all AI-powered development tools with caution, especially those requesting elevated system permissions.

  6. Conduct regular audits of development environments, including browser sessions, secrets, stored tokens, and installed extensions.


This attack marks a turning point in developer-focused cybercrime. 

By targeting the very tools that developers rely on daily, attackers gain unprecedented access to the global software ecosystem. The findings underscore the urgent need for stronger supply-chain security, rigorous extension vetting, and behavioral monitoring to defend the world’s most sensitive development workflows.

AI Disclaimer: An advanced artificial intelligence (AI) system generated the content of this page on its own. This innovative technology conducts extensive research from a variety of reliable sources, performs rigorous fact-checking and verification, cleans up and balances biased or manipulated content, and presents a minimal factual summary that is just enough yet essential for you to function as an informed and educated citizen. Please keep in mind, however, that this system is an evolving technology, and as a result, the article may contain accidental inaccuracies or errors. We urge you to help us improve our site by reporting any inaccuracies you find using the "Contact Us" link at the bottom of this page. Your helpful feedback helps us improve our system and deliver more precise content. When you find an article of interest here, please look for the full and extensive coverage of this topic in traditional news sources, as they are written by professional journalists that we try to support, not replace. We appreciate your understanding and assistance.
Newsletter

Related Articles

0:00
0:00
Close
Five Affordable Retirement Destinations in Australia Showing Strong Appeal for Retirees
Japan Seeks Strategic Indispensability to Trump as Model for Australia’s Regional Role
Roger Federer Returns to Australian Open for Inaugural Opening Ceremony and Exhibition Celebration
Australia Confronts Strained Ties With Trump’s United States as Public Trust Declines
Australia’s World-First Social Media Ban Leads to Removal of About Four Point Seven Million Under-16 Accounts
UK Moves to Criminalise Non-Consensual AI ‘Nudify’ Images as Ofcom Probes Grok AI
Australia’s Ambassador to the United States to Leave Post Early After Tensions with Trump Surface
Australian Open’s ‘1 Point Slam’ Evolves into Global Spectacle Ahead of 2026 Tournament
One Month After Bondi Beach Massacre, Australia Grapples with Grief, Reform and Resilience
Meta Calls on Australia to Reevaluate Under-16 Social Media Ban After Blocking Over Half a Million Accounts
Starmer’s Push to Rally Support for Action Against Elon Musk’s X Faces Setback as Canada Shuns Ban
Mixed Reactions Emerge as Australian Teens and Families Adjust to World-First Social Media Ban
Australia Strengthens Online Safety Laws to Compel Social Platforms to Remove Abusive Content
Bain Capital-Backed Bridge Data Centres Poised for Global Expansion After Major Financing Raise
Australia Launches Royal Commission on Antisemitism Following Bondi Beach Massacre
There is no sovereign immunity for poisoning millions with drugs.
Why Australia’s Retirement System Outperforms the United States’ and What It Means for U.S. Policy Debate
China and Australia Intensify Contest for Influence Through Solomon Islands Policing
Australia and India Set Sights on Critical Mineral Opportunities Across Africa to Diversify Global Supply Chains
Debate Intensifies in Australia as Labor Factions Urge Albanese to Withdraw Israeli President’s Visit Invitation
Media Magnate and US Steelmaker Launch A$13.2 Billion Bid to Acquire BlueScope
Ukraine Conflict Signals Strategic Warning for Australia on Asia-Pacific Security
Australia Weighs Regional Stability and International Law After U.S. Raid on Venezuela
Bondi Beach Hero Ahmed al Ahmed and First Responders Honoured at Sydney Cricket Ground
Australia and New Zealand Urge Respect for International Law After U.S. Capture of Venezuela’s Maduro
Australian Exporters Still Grapple with Trump’s Tariff Fallout Across U.S. Trade
UK Terror Watchdog Calls for Australian-Style Social Media Ban to Protect Teenagers
President Trump Says United States Will Administer Venezuela Until a Secure Leadership Transition
Delta Force Identified as Unit Behind U.S. Operation That Captured Venezuela’s President
Berkshire’s Buffett-to-Abel Transition Tests Whether a One-Man Trust Model Can Survive as a System
Venus Williams to Return to Australian Open at Forty-Five With Wild-Card Entry
Australia Welcomes 2026 With Dazzling Fireworks Over Sydney Harbour
US and Australian Cyber Agencies Warn of Active ‘MongoBleed’ Exploitation Targeting MongoDB Servers
Surging Gold Prices Trigger Modern ‘Gold Rush’ Across Australia’s Historic Fields
Australia’s Prime Minister Booed at Bondi Beach Memorial Amid National Debate Over Terror Response
From Street Unrest to Courtroom Drama, Australia Confronts a Year of Shock and Strain
Australia Welcomes First Climate-Visa Tuvaluans as Migration Ballot Draw Nears After Record Applications
Trump Signals Interest in Australia’s Retirement Model and Explains Why It’s Hard to Replicate in the United States
Australians Grapple With World-First Social Media Ban as Parents Weigh Relief Against Fear
Australian Rabbis Call on Albanese to Establish National Antisemitism Inquiry
Teens Forge Strong International Bonds Without Social Media Through Messaging, Games and Real-World Ties
UK Anti-Disinformation Campaigner Sues Trump Administration After Being Targeted Over Tech Regulation
Australia Signals Support for U.S. Strike Against ISIS ‘Scum’ in Nigeria
Australian Wheat Grows as Competitive Force in South Korea’s Milling Imports
Antisemitism Incidents Surge in Australia Following Bondi Beach Attack
Debate Intensifies Over Media Role in Australia’s Rising Antisemitism After Bondi Terror Attack
Fine Wine Investors Find Little Cheer in Third Year of Falls
Major Flight Disruptions Disrupt Christmas Travel as Virgin Australia and Jetstar Operations Struggle Across Sydney, Brisbane and Melbourne
Australians Poised for Strong Boxing Day Spending as Consumer Watchdog Flags Misleading Sales Tactics
Nicole Kidman Celebrates Christmas in Australia Embracing Natural Curly Hair After Split
×