Contact

Mining in Plain Sight: The VS Code Extension Cryptojacking Campaign

NetmanageIT OpenCTI - opencti.netmanageit.com

Mining in Plain Sight: The VS Code Extension Cryptojacking Campaign



SUMMARY :

A sophisticated cryptomining campaign has been discovered targeting developers through seemingly legitimate VS Code extensions. The campaign, potentially reaching over one million installations, involves fake extensions published by three different authors. These extensions secretly download a PowerShell script that disables Windows security, establishes persistence, and installs an XMRig cryptominer. The most successful fake extension gained 189K installs. The attackers created a multi-stage attack, even installing legitimate extensions they impersonated to avoid suspicion. The campaign published ten different malicious extensions, with the top three showing unusually high install counts, suggesting artificial inflation. The extensions share identical code and communicate with the same C2 server. The PowerShell script sets up persistence mechanisms, disables Windows security services, and attempts privilege escalation.

OPENCTI LABELS :

cryptojacking,xmrig,developer tools


Open in NetmanageIT OpenCTI Public Instance with below link!


Use public read only username and password on login page.

NOTE : Use Public READ only user credentials on login page banner.


Mining in Plain Sight: The VS Code Extension Cryptojacking Campaign