By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright Β© All Rights Reserved. World of Software.
Reading: GitHub confirms massive flaw via VS Code extension
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright Β© All Rights Reserved. World of Software.
World of Software > Computing > GitHub confirms massive flaw via VS Code extension
Computing

GitHub confirms massive flaw via VS Code extension

News Room
Last updated: 2026/05/21 at 12:39 PM
News Room Published 21 May 2026
Share
GitHub confirms massive flaw via VS Code extension
SHARE

On May 20, the world’s most widely used development platform sounded the alarm. An employee was the unwitting gateway to a sophisticated attack. By installing a booby-trapped extension for VS Code, he allowed hackers to exfiltrate sensitive data directly from the company’s internal servers. GitHub responded quickly by isolating the compromised workstation and revoking critical credentials, but the damage was done. The attackers, a group known as TeamPCP, claimed responsibility for the theft and made no secret of it.

What was the exact entry point of this attack?

It all started with an extension for Visual Studio CodeMicrosoft’s code editor, which had been compromised by a malicious actor. A GitHub employee installed this infected version, unknowingly creating a Trojan horse at the very heart of the infrastructure. Once inside, the attackers were given free rein to gain access to the network and begin exfiltrating data from thousands of internal code repositories. This is the classic scenario of Cyber ​​attack through the software supply chain, where trust in a third-party tool becomes the weak link.

The company acted quickly. The compromised device was isolated, the malicious extension removed from the market, and the most sensitive API credentials and keys were immediately revoked. But this reactivity, although laudable, does not erase the reality: the breach has taken place. It’s a brutal reminder of the tool vulnerability that developers use every day.

Who is behind this operation and what do they want?

The group TeamPCP was quick to claim authorship of the attack on a well-known cybercrime forum. This is not their first coup; the group is already associated with incidents involving infected npm packages at SAP or an attack against the open source security scanner Trivy. They even recently published the code source of a computer worm called β€œShai-Hulud”. Their modus operandi is clear: strike targets with high added value.

For GitHub data, their plan is commercial. They put the loot up for sale for a starting price set at 50 000 dollars. The group insists that this is not a ransom demand addressed to the company, but a simple sale to the highest bidder. A maneuver which, let’s be honest, looks very much like a thinly veiled blackmailsince they threaten to publish all of the data for free if no buyer comes forward.

github

What are the real consequences for developers?

Even if GitHub ensures that no customer data seems to have leaked, the shock wave is very real. The developer community is on alert. Influential figures, like the founder of Binance, immediately advised their millions of followers to check and revoke all secrets and API keys stored in their repositories, whether public or private. The message is simple: consider that everything that is on GitHub has potentially been exposed.

This incident highlights a collective negligence : the common practice of storing sensitive identifiers directly in code, relying on the supposed security of a private repository. This attack proves that this security is relative. For every developer, this is a call to drastically review security practices: verify every extension, use vaults for secrets, and systematically enable code scanning tools to detect exposed credentials.

Frequently Asked Questions (FAQ)

Has customer and user data been stolen?

At this point in the investigation, GitHub says it has found no evidence that customer data, company accounts, or user repositories were compromised. The attack appears to have been limited to the company’s internal repositories.

How can I protect my own development environment?

It is crucial to only install verified VS Code extensions from trusted sources. As a precaution, revoke and replace all of your API keys and secrets stored in your repositories. Finally, enable the β€œsecret scanning” tools that GitHub offers to automatically detect exposed identifiers in your code.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The wealth gap between young and old in Spain is skyrocketing and we have a suspect: housing The wealth gap between young and old in Spain is skyrocketing and we have a suspect: housing
Next Article Intel Core i9, RAM 24 Go, SSD 1 To πŸš€ Intel Core i9, RAM 24 Go, SSD 1 To πŸš€
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

OpenAI guarantees business customers AI access – for an additional charge
OpenAI guarantees business customers AI access – for an additional charge
News
Intel Core i9, RAM 24 Go, SSD 1 To πŸš€
Intel Core i9, RAM 24 Go, SSD 1 To πŸš€
Mobile
The wealth gap between young and old in Spain is skyrocketing and we have a suspect: housing
The wealth gap between young and old in Spain is skyrocketing and we have a suspect: housing
Gaming
Robotics researcher Burgard: Why humanoid robots are still in their early stages
Robotics researcher Burgard: Why humanoid robots are still in their early stages
Software

You Might also Like

a flaw still without a name
Computing

a flaw still without a name

4 Min Read
Infomaniak makes itself unsellable to protect your data!
Computing

Infomaniak makes itself unsellable to protect your data!

3 Min Read
Amazon Prime Video faces Germany’s largest collective action
Computing

Amazon Prime Video faces Germany’s largest collective action

4 Min Read
already good for the trash after 350 hours?
Computing

already good for the trash after 350 hours?

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright Β© All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?