'WhiteCobra' floods VSCode market with crypto-stealing extensions
威胁行为者WhiteCobra针对VSCode、Cursor和Windsurf用户植入24个恶意扩展至Visual Studio市场和Open VSX注册表中。该活动持续进行中,攻击者不断上传新代码以替换被移除的扩展。此前核心Ethereum开发者Zak Cole因使用看似合法的Cursor扩展而遭遇钱包清空。Koi安全公司指出WhiteCobra曾通过假扩展窃取50万美元加密货币。恶意扩展通过精心设计描述和虚高下载量伪装成正规产品。这些平台因缺乏审查机制成为攻击者的理想目标。攻击流程涉及执行主文件下载后续有效载荷,并最终运行LummaStealer等恶意软件窃取信息。 2025-9-14 20:45:24 Author: www.bleepingcomputer.com(查看原文) 阅读量:21 收藏

'WhiteCobra' floods VSCode market with crypto-stealing extensions

A threat actor named WhiteCobra has targeting VSCode, Cursor, and Windsurf users by planting 24 malicious extensions in the Visual Studio marketplace and the Open VSX registry.

The campaign is ongoing as the threat actor continuously uploads new malicious code to replace the extensions that are removed.

In a public post, core Ethereum developer Zak Cole described how his wallet was drained after using a seemingly legitimate extension (contractshark.solidity-lang) for Cursor code editor.

Tweet

Cole explained that the extension featured all the signs of a benign product with professionally designed icon, a detailed description, and 54,000 downloads on OpenVSX, Cursor's official registry.

WhiteCobra is the same group responsible for the $500,000 crypto-theft in July, through a fake extension for the Cursor editor, according to researchers at endpoint security provider Koi.

WhiteCobra attacks

VS (Visual Studio) Code, Cursor, and Windsurf are code editors supporting the VSIX extension - the default package format for extensions published on the VS Code Marketplace and the OpenVSX platform.

This cross-compatibility and the lack of proper submission review on these platforms make them ideal for attackers looking to run campaigns with a broad reach.

According to Koi Security, WhiteCobra creates malicious VSIX extensions that appear legitimate due to an overall carefully created description and inflated download count.

Koi Security discovered that the following extensions are part of the latest WhiteCobra campaign:

Open-VSX (Cursor/Windsurf)

  1. ChainDevTools.solidity-pro
  2. kilocode-ai.kilo-code
  3. nomic-fdn.hardhat-solidity
  4. oxc-vscode.oxc
  5. juan-blanco.solidity
  6. kineticsquid.solidity-ethereum-vsc
  7. ETHFoundry.solidityethereum
  8. JuanFBlanco.solidity-ai-ethereum
  9. Ethereum.solidity-ethereum
  10. juan-blanco.solidity
  11. NomicFdn.hardhat-solidity
  12. juan-blanco.vscode-solidity
  13. nomic-foundation.hardhat-solidity
  14. nomic-fdn.solidity-hardhat
  15. Crypto-Extensions.solidity
  16. Crypto-Extensions.SnowShsoNo

VS Code Marketplace

  1. JuanFBlanco.awswhh
  2. ETHFoundry.etherfoundrys
  3. EllisonBrett.givingblankies
  4. MarcusLockwood.wgbk
  5. VitalikButerin-EthFoundation.blan-co
  6. ShowSnowcrypto.SnowShoNo
  7. Crypto-Extensions.SnowShsoNo
  8. Rojo.rojo-roblox-vscode
Impersonation of legitimate projects to bait downloads
Impersonation (2) of legitimate projects (1) to bait downloads
Source: Koi Security

Wallet draining starts with executing the main file (extension.js) that is "nearly identical to the default “Hello World” boilerplate that comes with every VSCode extension template," the researchers say.

However, there is a simple call that defers execution to a secondary script (prompt.js). A next-stage payload is downloaded from Claudflare Pages. The payload is platform-specific, with available versions for Windows, macOS on ARM, and macOS on Intel.

On Windows, a PowerShell script executes a Python script that executes shellcode to run the LummaStealer malware.

LummaStealer is an info-stealing malware that targets cryptocurrency wallet apps, web extensions, credentials stored in the web browsers, and messaging app data.

On macOS, the payload is a malicious Mach-O binary that executes locally to load an unknown malware family.

According to WhiteCobra's internal playbook, the cybercriminals define revenue targets between $10,000 and $500,000, provide a command-and-control (C2) infrastructure setup guides, and describe social engineering and marketing promotion strategies.

Leaked WhiteCobra playbook
Leaked WhiteCobra playbook
Source: Koi Security

This confirms that the threat group operates in an organized fashion and is not deterred by exposure or takedowns. Koi Security says that WhiteCobra is capable of deploying a new campaign in less than three hours.

The researchers warn that better verification mechanisms are necessary to distinguish between malicious extensions and legitimate ones available in repositories, as ratings, download counts, and reviews can be manipulated to instill trust.

General recommendations when downloading coding extensions is to check for impersonation and typosquatting attempts, try to use only known projects with a good trust record. Typically, it is better to be suspicious of new projects that gathered a large number of downloads and positive reviews in a short amount of time.


文章来源: https://www.bleepingcomputer.com/news/security/whitecobra-floods-vscode-market-with-crypto-stealing-extensions/
如有侵权请联系:admin#unsafe.sh