Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical Wireshark Flaws Allow Code Execution via Malformed
May 1, 2026
Anthropic Launches Claude Security Beta for Enterprise
May 1, 2026
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Home/Threats/Backdoored Open VSX Extension Deploys RAT Used GitHub
Threats

Backdoored Open VSX Extension Deploys RAT Used GitHub

Hidden malware has been discovered within a popular code editor extension hosted on the Open VSX registry. This malicious component silently delivers a remote access trojan (RAT) and a full...

Sarah simpson
Sarah simpson
March 19, 2026 3 Min Read
0 0

Hidden malware has been discovered within a popular code editor extension hosted on the Open VSX registry. This malicious component silently delivers a remote access trojan (RAT) and a full infostealer directly to developer machines, operating completely without warning.

The extension, known as fast-draft under the KhangNghiem publisher account, had accumulated over 26,000 downloads before the malicious activity embedded within several specific releases finally came to light.​

The attack unfolded through a deliberate pattern spread across specific version releases. Versions 0.10.89, 0.10.105, 0.10.106, and 0.10.112 each contained code that reached out to a GitHub repository controlled by a threat actor named BlokTrooper.

The extension pulled platform-specific shell scripts directly from raw.githubusercontent[.]com/BlokTrooper/extension and piped the entire response straight into a system shell, which then downloaded and executed a full second-stage malware payload on the victim machine.

Other releases, including 0.10.88, 0.10.111, and the latest version 0.10.135, showed no such behavior, pointing strongly toward a compromised publisher account or a stolen release token rather than a maintainer who went rogue on purpose.​

Aikido analysts identified the compromised extension during a careful, manual version-by-version review of the fast-draft release line.

The team disclosed the issue to the extension maintainer on March 12, 2026, through a public GitHub issue, but the report had received no response whatsoever at the time of publication.​

The impact of this compromise is both broad and serious. Any developer who had one of the malicious versions installed unknowingly handed the attacker full control of their machine.

The second-stage payload ran four independent attack modules simultaneously, targeting browser credentials, crypto wallet data, local files, source code, and clipboard contents all at the same time.

With over 26,594 recorded downloads on the Open VSX registry, the potential exposure across open-source developers and software teams around the world is very significant.​

The wider danger here is how the malware concealed itself inside a tool developers already trusted on a daily basis. Editor extensions typically run with broad system permissions, making them a highly attractive target for supply chain attacks.

The alternating clean-and-malicious version pattern strongly suggests someone with intermittent access to the publisher’s release pipeline, a scenario that automated scanning alone cannot reliably detect without thorough and careful manual review.​

Inside the Second-Stage Attack Framework

Once the shell downloader executed, it pulled a ZIP archive, extracted it to a temporary directory, and launched four detached Node.js processes, with each one handling a separate part of the overall attack.

The first module connected back to the command-and-control server at 195[.]201[.]104[.]53 over port 6931 using Socket.IO, giving the attacker live control over mouse movement, keyboard input, screenshots, and clipboard reads.​

The second module swept through browser profiles on Chrome, Edge, Brave, and Opera across Windows, macOS, and Linux, stealing saved passwords and web data.

It also targeted 25 cryptocurrency wallet extensions, including MetaMask, Phantom, Coinbase Wallet, and Trust Wallet, and uploaded the collected data to port 6936 on the same C2 server.​

The third module recursively scanned the home directory for documents, environment files, private keys, shell history, and source code.

It deliberately skipped folders like .cursor, .claude, and .windsurf, showing the attacker was specifically targeting high-value AI-assisted developer environments.

The fourth module polled the clipboard every few seconds and sent captured content — including seed phrases, API keys, and passwords — straight to /api/service/makelog on the C2 server.​

Developers should immediately check for any installed version of fast-draft matching 0.10.89, 0.10.105, 0.10.106, or 0.10.112 and remove it without delay.

All stored credentials, cryptocurrency wallet seed phrases, and API keys on affected machines should be rotated promptly.

Network teams should block and monitor all outbound traffic to 195[.]201[.]104[.]53 on ports 6931, 6936, and 6939, and flag any requests to raw.githubusercontent[.]com/BlokTrooper in network logs.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Iran-Linked Botnet Exposed After Open Directory Leak Reveals

Next Post

Horabot Banking Trojan Attacks Mexico with Phishing & Email Worm

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Targeted Large-Scale Campaign Attacking U.S. Organizations with
April 30, 2026
Popular Python Package ‘lightning’ Hacked in Supply Chain
April 30, 2026
FBI & CISA Release Zero Trust Guide for Released Principles
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us