Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Home/Threats/Hackers Weaponize Open VSX Extension with Weaponized Sophisticated
Threats

Hackers Weaponize Open VSX Extension with Weaponized Sophisticated

A dangerous malware campaign has infiltrated the Open VSX extension marketplace, resulting in the compromise of over 5,000 developer workstations. Attackers achieved this breach by distributing a...

Sarah simpson
Sarah simpson
January 30, 2026 2 Min Read
2 0

A dangerous malware campaign has infiltrated the Open VSX extension marketplace, resulting in the compromise of over 5,000 developer workstations. Attackers achieved this breach by distributing a fake Angular Language Service extension.

The malicious package disguised itself as legitimate development tooling, bundling authentic Angular and TypeScript components alongside encrypted malware code that activates when developers open HTML or TypeScript files.

The extension operated undetected for two weeks in the Open VSX marketplace, presenting itself as a trusted productivity tool for Angular developers.

Once installed, it immediately began decrypting hidden payloads using AES-256-CBC encryption, establishing connections to command-and-control infrastructure hosted on the Solana blockchain.

This approach provides attackers with persistent, censorship-resistant communication channels that cannot be easily taken down by security teams.

Annex analysts identified the malware after analyzing suspicious extension behavior within the Open VSX ecosystem.

The threat specifically targets developer credentials for NPM and GitHub, cryptocurrency wallets across 60 different platforms, and browser-stored authentication tokens.

Geographic filtering mechanisms prevent execution on Russian systems, suggesting the campaign originates from Russian-speaking threat groups seeking to avoid domestic prosecution.

The malware’s capabilities extend beyond simple data theft. It terminates browser processes to unlock database files, extracts OAuth tokens from VS Code configurations, and validates stolen credentials in real-time.

Angular Language Service (Source - Annex)
Angular Language Service (Source – Annex)

Exfiltrated data packages are compressed and transmitted to command servers, with backup infrastructure addresses retrieved through compromised Google Calendar links when primary channels become unavailable.

Blockchain-Based Command Infrastructure

The malware employs a technique called “Etherhiding” to maintain resilient command-and-control operations through Solana blockchain transactions.

After initial activation, the extension queries a specific Solana wallet address containing Base64-encoded instructions within transaction memo fields.

This architecture offers several advantages: blockchain immutability ensures configuration data persists indefinitely, public RPC endpoints remain highly available, and attackers can update payload URLs without modifying the published extension.

Payload's capabilities (Source - Annex)
Payload’s capabilities (Source – Annex)

The Solana wallet address BjVeAjPrSKFiingBn4vZvghsGj9KCE8AJVtbc9S8o8SC has received 10 configuration updates over the past month, with the most recent modification occurring on January 28, 2026.

Each update delivers new server addresses hosting encrypted secondary payloads, enabling attackers to adapt their infrastructure faster than defenders can respond.

This approach eliminates single points of failure and provides takedown resistance that traditional domain-based command systems cannot match.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwareSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Wireshark 4.6.3 Released With Vulnerabilities Dissector and Parser

Next Post

Fortinet Devices: 3.2M Exposed Web Properties Online With

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Hackers Steal Crypto & Passwords via Fake OpenClaw Installer
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us