AI-Powered Ransomware Found in VS Code Extension, Removed

AI-Generated Malicious VS Code Extension with Ransomware and Vidar-Stealing npm Packages Highlight Growing Supply Chain Attack Risks

  • A malicious Visual Studio Code extension with Ransomware features was released using AI-generated code.
  • The extension encrypts, zips, and uploads files from a test directory and uses GitHub for command-and-control functions.
  • Datadog Security Labs identified 17 npm packages distributing the Vidar information stealer.
  • These npm packages executed Vidar through post-install scripts, using Telegram and Steam accounts as dead drops for command-and-control servers.
  • Supply chain attacks continue to target open-source registries, emphasizing the need for developer caution.

A Visual Studio Code (VS Code) extension named “susvsex” with built-in ransomware capabilities was uploaded on November 5, 2025. The extension, created with apparent assistance from Artificial Intelligence, automatically compresses, uploads, and encrypts files from designated test directories on Windows and macOS systems. John Tuckner, a security researcher at Secure Annex, flagged the extension, which was quickly removed by Microsoft from the official VS Code Marketplace on November 6. More details on the extension can be found in Tuckner’s report and on the marketplace page.

- Advertisement -

The Malware activates upon specific VS Code events, leveraging a function called “zipUploadAndEncrypt” that archives the target directory, uploads it to a remote server, and replaces files with encrypted versions. The current configuration targets a staging directory, limiting immediate damage. The extension communicates with a private GitHub repository using embedded access tokens, polling for commands in an “index.html” file and submitting results to “requirements.txt.” The repository’s owner, linked to the GitHub account “aykhanmv,” reportedly resides in Baku, Azerbaijan.

Meanwhile, Datadog Security Labs uncovered 17 malicious npm packages disguised as benign software development kits that deliver the Vidar info-stealing malware. These packages, uploaded by users “aartje” and “saliii229911,” were first detected on October 21, 2025, and were removed after about 2,240 downloads. The full list of package names is available in their disclosure.

The attack involves a post-install script in the package.json file that downloads a ZIP archive from a domain linked to malicious activity and runs the Vidar executable within it. Some variants use PowerShell commands embedded in the package.json to initiate the download before passing control to JavaScript code. Vidar 2.0 samples utilize hard-coded Telegram and Steam accounts as dead drop points to locate the command-and-control servers.

Security researchers Tesnim Hamdouni, Ian Kretz, and Sebastian Obregoso noted the variation in post-install scripts might help evade detections, as outlined in their analysis. This case adds to a series of supply chain attacks targeting open-source platforms like npm, PyPI, RubyGems, and Open VSX, underscoring the importance of vetting dependencies, reviewing changelogs, and monitoring for typosquatting or dependency confusion prior to installation.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Human Brain Cells Trained to Play Doom in Lab

Cortical Labs has successfully trained 200,000 living human neurons to play the 1993 video...

US Seizes $327K in USDT in Romance Scam Crackdown

The U.S. Justice Department seeks to forfeit nearly $328,000 in USDt linked to an...

Aave DAO Passes Contentious Proposal, But Changes Ahead

Aave Labs' controversial governance proposal passed an initial snapshot vote on Saturday with a...

Tether’s USAT Gets First Deloitte Attestation Report

Deloitte has issued the first attestation report for Tether USAT's reserves, revealing they slightly...

U.S. May Cap Critical AI Chip Sales to Chinese Firms

The Trump administration is reportedly discussing new export controls on advanced AI chips to...

Must Read

What Is a Sim Swap Hack?

You've likely heard the term 'sim-swap,' but do you really know what it means? It's a type of fraud that's rapidly increasing, where scammers...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!