Cybersecurity researchers have identified a malicious Visual Studio Code extension named susvsex on the official VS Code Extension Marketplace that contained built-in ransomware functionality. The extension, uploaded on November 5, 2025, by a publisher named suspublisher18, made no attempt to hide its malicious nature. Its code was designed to zip a directory, exfiltrate the data, and then encrypt the original files. The extension, which appears to have been partially generated using AI, also used a private GitHub repository for command and control (C2). While the immediate impact was limited as the extension was quickly removed by Microsoft, the incident highlights a growing threat vector: the compromise of developer tools and ecosystems through malicious extensions.
This incident represents a direct threat to the software development lifecycle, targeting developers in their primary workspace. The key aspects are:
susvsex extension, which functions as a rudimentary piece of ransomware and spyware.suspublisher18 and an associated GitHub account are linked to the extension. The developer's location is noted as Azerbaijan.The publisher's description, "Just testing," suggests this may have been an experiment or a proof-of-concept. However, the functionality was fully malicious and could easily be weaponized to cause significant damage by changing the target directory from a test folder to user directories like Documents or Desktop.
The malicious extension's workflow is a classic example of data theft followed by destructive action. The attack techniques involved include:
T1195.001 - Compromise Software Dependencies: By publishing a malicious extension to a public repository, the attacker is compromising a component that developers might integrate into their environment.T1560.001 - Archive via Utility: The extension uses a function to create a ZIP archive of a specified directory.T1041 - Exfiltration Over C2 Channel: The ZIP file is exfiltrated to a remote server controlled by the attacker.T1486 - Data Encrypted for Impact: After exfiltration, the original files in the target directory are encrypted.T1102.002 - Bidirectional Communication: The use of a private GitHub repository as a C2 channel to fetch commands and exfiltrate results is a known technique to blend in with legitimate developer traffic.The discovery coincides with a separate campaign where 17 trojanized npm packages were found deploying the Vidar information stealer, indicating a broader trend of targeting the software supply chain through developer package managers and extensions.
While this specific extension was likely downloaded by very few users, the potential impact of such an attack vector is high:
Detecting a malicious extension can be difficult as they operate with the permissions granted by the user upon installation.
D3-PA: Process Analysis is critical.D3-OTF: Outbound Traffic Filtering.Securing developer environments requires a combination of technical controls and developer awareness.
D3-EAL: Executable Allowlisting.Implementing an allowlist for approved VS Code extensions can prevent the installation and execution of malicious ones.
While the marketplace has its own signing, encouraging developers to only trust extensions from publishers with a known, verified identity adds a layer of security.
Mapped D3FEND Techniques:
Filtering outbound network traffic from developer workstations can block C2 communication and data exfiltration attempts.
Mapped D3FEND Techniques:
Using an EDR to monitor for anomalous behavior, such as a code editor attempting to encrypt files in user directories, can detect and block the malicious payload.
Mapped D3FEND Techniques:
To defend against malicious VS Code extensions like 'susvsex', organizations must treat extensions as executable code and apply allowlisting policies. Security teams should work with development leads to create and maintain a curated list of approved, vetted VS Code extensions that are necessary for business operations. This list can be enforced through group policies or MDM profiles that configure VS Code's settings to prevent the installation of any extension not on the allowlist. This moves the organization from a reactive stance (removing malicious extensions after discovery) to a proactive one. While it introduces some friction for developers, it provides a powerful preventative control against an entire class of supply chain attacks targeting developer environments.
As a detective control, robust Process Analysis on developer workstations is crucial. An EDR solution should be configured to monitor the process tree and command-line arguments originating from the VS Code process (Code.exe). A rule should be created to generate a high-priority alert if the VS Code process spawns any unexpected child processes, especially system utilities used for archiving (zip, tar), encryption, or network communication (curl, wget). For example, detecting Code.exe as the parent process of a command that is reading files from C:\Users\<user>\Documents and writing them to a zip archive is a very high-confidence indicator of malicious activity. This allows security teams to detect and respond to a malicious extension even if it was not on a denylist.
To block the C2 and exfiltration capabilities of malicious extensions, organizations should implement strict Outbound Traffic Filtering for developer workstations. Since 'susvsex' used GitHub for C2, filtering should be granular. Instead of blocking GitHub entirely, which is impractical for developers, use a forward proxy or SASE solution to allow connections only to the organization's own repositories and other explicitly approved public repositories. All other connections, especially to private repositories of unknown accounts or raw content URLs, should be blocked and logged. This prevents the extension from receiving new commands or exfiltrating stolen data, effectively neutering its spyware capabilities. Monitoring for a large volume of blocked outbound requests from VS Code can also serve as an indicator of a compromised machine.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats