Close Menu
Şevket Ayaksız

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    C++ Creator Advocates for Memory Safety through Profiling

    Nisan 23, 2025

    Zencoder’s Vision for AI-Driven Coding: A Comprehensive Review

    Nisan 23, 2025

    Agentforce 2dx: Salesforce’s Push to Streamline AI Agent Creation and Deployment

    Nisan 23, 2025
    Facebook X (Twitter) Instagram
    • software
    • Gadgets
    Facebook X (Twitter) Instagram
    Şevket AyaksızŞevket Ayaksız
    Subscribe
    • Home
    • Technology

      Ryzen 8000 HX Series Brings Affordable Power to Gaming Laptops

      Nisan 10, 2025

      Today only: Asus OLED laptop with 16GB RAM drops to $550

      Nisan 6, 2025

      Panther Lake: Intel’s Upcoming Hybrid Hero for PCs

      Nisan 5, 2025

      A new Xbox gaming handheld? Asus’ teaser video sparks speculation

      Nisan 2, 2025

      Now available—Coolify’s ‘holographic’ PC fans bring a unique visual effect

      Nisan 2, 2025
    • Adobe
    • Microsoft
    • java
    • Oracle
    Şevket Ayaksız
    Anasayfa » Developer Alert: 10 VSCode Extensions You Should Avoid
    software

    Developer Alert: 10 VSCode Extensions You Should Avoid

    By mustafa efeNisan 19, 2025Yorum yapılmamış2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A recent warning to developers using Microsoft’s Visual Studio Code (VSCode) editor has highlighted the discovery of 10 malicious extensions that could potentially infect systems with cryptomining software. According to researchers at ExtensionTotal, these deceptive extensions, which disguise themselves as popular development tools, have been available on the VSCode Marketplace since April 4. While the exact number of installations is uncertain, researchers believe that up to 1 million downloads could have occurred. However, there are suspicions that threat actors may have artificially inflated the download figures to appear more widespread than they actually are.

    Once installed, the malicious extensions download a PowerShell loader that ensures persistence on the system, disables security services, and triggers the deployment of the XMRig cryptominer from a remote command-and-control (C2) server. The cryptominer silently runs in the background, consuming system resources and potentially slowing down the affected machine. This latest attack is part of an ongoing trend where attackers target developers by planting harmful tools on trusted sites like GitHub, npm, and others, hoping to trick users into downloading them.

    Robert Beggs, CEO of the Canadian incident response firm DigitalDefence, referred to this attack as a “classic” third-party supply chain attack. He noted that while the techniques used are not particularly advanced, the real concern lies in the lack of proper defenses on developers’ machines. Beggs emphasized that there should be multiple layers of protection in place, such as Microsoft Defender, which should warn users when a security feature is being disabled or when a critical system change, like a Windows Registry modification, is attempted.

    The real issue, Beggs argues, is that developers often disable these security alerts while focusing on their coding tasks. This tendency to overlook security warnings makes them particularly vulnerable to attacks like the one described. To mitigate such risks, Beggs advises that organizations should ensure their developers work in isolated environments, separate from the production network. This layered security approach would help prevent malicious extensions from compromising critical systems and applications.

    Post Views: 10
    java Programming Languages Software Development
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    mustafa efe
    • Website

    Related Posts

    C++ Creator Advocates for Memory Safety through Profiling

    Nisan 23, 2025

    Zencoder’s Vision for AI-Driven Coding: A Comprehensive Review

    Nisan 23, 2025

    Agentforce 2dx: Salesforce’s Push to Streamline AI Agent Creation and Deployment

    Nisan 23, 2025
    Add A Comment

    Comments are closed.

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    Ocak 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    Ocak 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    Ocak 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By sevketayaksiz
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By sevketayaksiz
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By sevketayaksiz
    Advertisement
    Demo
    Şevket Ayaksız
    Facebook X (Twitter) Instagram YouTube
    • Home
    • Adobe
    • microsoft
    • java
    • Oracle
    • Contact
    © 2025 Theme Designed by Şevket Ayaksız.

    Type above and press Enter to search. Press Esc to cancel.