This document copyright Checkmarx, all rights reserved. The recent campaign of malicious Visual Studio Code (VSCode) extensions that aimed to impersonate the legitimate (and useful!) Prettier code formatter extension appears to have expanded to more extensions, which Checkmarx Zero has worked to remove from the VSCode Marketplace and the alternative Open VSX marketplace. The extensions follow similar brandjacking tactics as the campaign to impersonate Prettier, with three new tricks: The adversary is targeting a wider variety of legitimate packages to brandjack, rather than focusing on just one. The unusually high “installs-to-downloads” ratio suggests the adversary is faking popularity to try to make their packages appear more legitimate; this is combined with using version numbers that appear slightly newer than the legitimate equivalents. In many cases, the install count was in the thousands even though the extension was only downloaded less than 40 times. These specific malicious VSCode extensions didn’t yet contain a payload. This is a tactic we’ve seen before: cloning legitimate functionality, pushing adoption while the package is safe, and then publishing an auto-installed upgrade that contains the payload at a future time. We can’t definitively say this is the same adversary as targeted the Prettier name space earlier. But the similarity in basic tactics strongly suggests that it is the same adversary, and that they have evolved their attack in an attempt to target developers using VSCode. Get security news in your Inbox Subscribe to Checkmarx Zero Never Miss Checkmarx Zero Research Updates. Subscribe today! By submitting my information to Checkmarx, I hereby consent to the terms and conditions found in the Checkmarx Privacy Policy and to the processing of my personal data as described therein. By clicking submit above, you consent to allow Checkmarx to store and process the personal information submitted above to provide you the content requested. Impacted Extensions Malicious Package Legitimate Equivalent being targeted Marketplace targeted sqlmtxredev.quarto-pro quarto.quarto VSCode, Open VSX senseDevpro.profiler-php-pro DEVSENSE.profiler-php-vscode VSCode, Open VSX RooIncVeterinaryDev.roo-cline-pro RooVeterinaryInc.roo-cline VSCode, Open VSX DevCatppuccinpro.catppuccin-pro-vsc Catppuccin.catppuccin-vsc VSCode, Open VSX devCHOUZZ.vscode-better-align-pro Chouzz.vscode-better-align VSCode, Open VSX MahendrakarPrateek.prettyxml-pro PrateekMahendrakar.prettyxml Open VSX Prompt responses from Marketplace maintainers We’ve had excellent responses from Microsoft (who manage the VSCode Marketplace) and Open VSX alike. Since our reports are all based on human analysis and verification performed by skilled researchers, and since we provide a complete description of what specific indications of malicious behavior led to our report, maintainers are able to promptly verify our report and take decisive action. In all cases, we were able to identify the packages when they had just a handful of downloads, and the prompt response by maintainers means they were all taken down with under 40 downloads (except senseDevpro.profiler-php-pro, which annoyingly hit 41 downloads before removal). linkedin-app Share on LinkedIn Share on Bluesky Follow Checkmarx Zero: linkedin-app