"Vibe-Coded Malicious VS Code Extension Discovered with Embedded Cryptocurrency Mining Functionality"
- Nov 7, 2025
- 2 min read
Background
Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities.
The extension, named "susvsex," was uploaded on November 5, 2025, by a user named "suspublisher18."
The extension was designed to automatically activate itself on any event, including installing or when launching VS Code, and invoke a function named "zipUploadAndEncrypt."
Extension Functionality
The "zipUploadAndEncrypt" function creates a ZIP archive of a target directory, exfiltrates it to a remote server, and replaces the files with their encrypted versions.
The TARGET_DIRECTORY is configured to be a test staging directory, but it can be easily updated with an extension release or a command sent through the C2 channel.
The extension also uses GitHub as a command-and-control (C2) by polling a private GitHub repository for any new commands to be executed.
The results of the command execution are written back to the same repository in the "requirements.txt" file using a GitHub access token embedded in the code.
Indicators of "Vibe-Coded" Malware
Extraneous comments detailing functionality, README files with execution instructions, and placeholder variables are clear signs of "vibe-coded" malware.
The extension package accidentally included decryption tools, command and control server code, and GitHub access keys to the C2 server, which other people could use to take over the C2.
Related Malicious npm Packages
Datadog Security Labs has uncovered 17 npm packages that masquerade as benign software development kits (SDKs) and provide the advertised functionality, but are engineered to stealthily execute Vidar Stealer on infected systems.
The cybersecurity company is tracking the cluster under the name MUT-4831, and some of the packages were first flagged on October 21, 2025, with subsequent uploads recorded the next day and on October 26.
The attack chain involves downloading a ZIP archive from an external server ("bullethost[.]cloud domain") and executing the Vidar executable contained within the ZIP file.
The Vidar 2.0 samples have been found to use hard-coded Telegram and Steam accounts as dead drop resolvers to fetch the actual C2 server.
Sources
https://thehackernews.com/2025/11/vibe-coded-malicious-vs-code-extension.html
https://www.itsecuritynews.info/vibe-coded-malicious-vs-code-extension-found-with-built-in-ransomware-capabilities/


Comments