By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code
Computing

Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code

News Room
Last updated: 2026/01/26 at 11:36 AM
News Room Published 26 January 2026
Share
Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code
SHARE

Ravie LakshmananJan 26, 2026AI Security / Vulnerability

Cybersecurity researchers have discovered two malicious Microsoft Visual Studio Code (VS Code) extensions that are advertised as artificial intelligence (AI)-powered coding assistants, but also harbor covert functionality to siphon developer data to China-based servers.

The extensions, which have 1.5 million combined installs and are still available for download from the official Visual Studio Marketplace, are listed below –

  • ChatGPT – 中文版 (ID: whensunset.chatgpt-china) – 1,340,869 installs
  • ChatGPT – ChatMoss(CodeMoss)(ID: zhukunpeng.chat-moss) – 151,751 installs
Cybersecurity

Koi Security said the extensions are functional and work as expected, but they also capture every file being opened and every source code modification to servers located in China without users’ knowledge or consent. The campaign has been codenamed MaliciousCorgi.

“Both contain identical malicious code — the same spyware infrastructure running under different publisher names,” security researcher Tuval Admoni said.

What makes the activity particularly dangerous is that the extensions work exactly as advertised, providing autocomplete suggestions and explaining coding errors, thereby avoiding raising any red flags and lowering the users’ suspicion.

At the same time, the embedded malicious code is designed to read all of the contents of every file being opened, encode it in Base64 format, and send it to a server located in China (“aihao123[.]cn”). The process is triggered for every edit.

The extensions also incorporate a real-time monitoring feature that can be remotely triggered by the server, causing up to 50 files in the workspace to be exfiltrated. Also present in the extension’s web view is a hidden zero-pixel iframe that loads four commercial analytics software development kits (SDKs) to fingerprint the devices and create extensive user profiles.

The four SDKs used are Zhuge.io, GrowingIO, TalkingData, and Baidu Analytics, all of which are major data analytics platforms based in China.

PackageGate Flaws Affect JavaScript Package Managers

The disclosure comes as the supply chain security company said it identified six zero-day vulnerabilities in JavaScript package managers like npm, pnpm, vlt, and Bun that could be exploited to defeat security controls put in place to skip the automatic execution of lifecycle scripts during package installation. The flaws have been collectively named PackageGate.

Defenses such as disabling lifecycle scripts (“–ignore-scripts”) and committing lockfiles (“package-lock.json”) have become crucial mechanisms to confronting supply chain attacks, especially in the aftermath of Shai-Hulud, which leverages postinstall scripts to spread in a worm-like manner to hijack npm tokens and publish malicious versions of the packages to the registry.

Cybersecurity

However, Koi found that it’s possible to bypass script execution and lockfile integrity checks in the four package managers. Following responsible disclosure, the issues have been addressed in pnpm (version 10.26.0), vlt (version 1.0.0-rc.10), and Bun (version 1.3.5). Pnpm is tracking the two vulnerabilities as CVE-2025-69264 (CVSS score: 8.8) and CVE-2025-69263 (CVSS score: 7.5).

Npm, however, has opted not to fix the vulnerability, stating “users are responsible for vetting the content of packages that they choose to install.” The Hacker News has reached out to npm/GitHub for further comment, and we will update the story if we hear back.

“The standard advice, disable scripts and commit your lockfiles, is still worth following,” security researcher Oren Yomtov said. “But it’s not the complete picture. Until PackageGate is fully addressed, organizations need to make their own informed choices about risk.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Tech workers call for CEOs to speak up against ICE after the killing of Alex Pretti |  News Tech workers call for CEOs to speak up against ICE after the killing of Alex Pretti | News
Next Article A look at Guidewire Software’s (GWRE) valuation after strong results and a cautious full-year outlook A look at Guidewire Software’s (GWRE) valuation after strong results and a cautious full-year outlook
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Spanish court acquits suspects denied access to ‘raw’ Sky ECC intercepts in landmark decision | Computer Weekly
Spanish court acquits suspects denied access to ‘raw’ Sky ECC intercepts in landmark decision | Computer Weekly
News
NIO to launch nine new models under three brands this year: CEO · TechNode
NIO to launch nine new models under three brands this year: CEO · TechNode
Computing
Kia Is Coming Out With Its Cheapest EV Yet – But There’s A Catch – BGR
Kia Is Coming Out With Its Cheapest EV Yet – But There’s A Catch – BGR
News
Why all JAMB centres must have CCTVs for 2026 UTME
Why all JAMB centres must have CCTVs for 2026 UTME
Computing

You Might also Like

NIO to launch nine new models under three brands this year: CEO · TechNode
Computing

NIO to launch nine new models under three brands this year: CEO · TechNode

4 Min Read
Why all JAMB centres must have CCTVs for 2026 UTME
Computing

Why all JAMB centres must have CCTVs for 2026 UTME

3 Min Read
In Conversation With Maheshwar Gourishetti: Architecting Enterprise Performance Management Solutions | HackerNoon
Computing

In Conversation With Maheshwar Gourishetti: Architecting Enterprise Performance Management Solutions | HackerNoon

5 Min Read
Microsoft unveils Maia 200 AI chip, claiming performance edge over Amazon and Google
Computing

Microsoft unveils Maia 200 AI chip, claiming performance edge over Amazon and Google

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?