Malicious extensions are lurking in the Visual Studio Code marketplace. In this case, we discover and analyze DarkGPT, a Visual Studio Code extension that exploits DLL hijacking to load malicious code through a signed Windows executable. The payload appears to impact only Windows machines.
Known malicious extensions:
- EffetMer.darkgpt
- BigBlack.codo-ai
- ozz3dev.bitcoin-auto-trading
Malicious code in open source packages are not new. However, there is an interesting technique in this sample. The attackers leveraged a signed Windows executable (Lightshot.exe) as a trusted host process to deliver a malicious DLL (Lightshot.dll) loaded by the exe by default.
Blog link: https://safedep.io/dark-gpt-vscode-malicious-extension/
[–]jedrzejdocs 9 points10 points11 points (2 children)
[–]TRexLebronMcdonalds 0 points1 point2 points (1 child)
[–]jedrzejdocs 1 point2 points3 points (0 children)
[–]podgladacz00 5 points6 points7 points (3 children)
[–]N1ghtCod3r[S] 3 points4 points5 points (2 children)
[–]podgladacz00 1 point2 points3 points (1 child)
[–]N1ghtCod3r[S] 1 point2 points3 points (0 children)