Jan 10, 2023·1 min read

Cybercriminals Exploit Visual Studio Marketplace for Supply Chain Attacks, Reveals Aqua Security

Aqua Security researchers discovered that hackers are using Visual Studio Marketplace to conduct supply chain attacks by impersonating popular VS Code extensions to deceive developers into downloading malicious versions.

Cybercriminals Exploit Visual Studio Marketplace for Supply Chain Attacks, Reveals Aqua Security

In a recent revelation from Aqua Security researchers, it has been discovered that cyber attackers are exploiting the Visual Studio Marketplace to launch supply chain attacks. The attacks involve impersonating popular VS Code extensions, tricking developers into downloading malware-infested versions of these extensions.

Visual Studio Code is a widely used integrated development environment (IDE), accounting for approximately 74.48 percent of developer usage worldwide. The platform's vast array of extensions contributes significantly to its popularity among the developer community.

According to Ilay Goldman, a Security Researcher at Aqua Security, the challenge of differentiating genuine extensions from malicious ones poses a significant risk for even the most security-conscious developers. This is further exacerbated by the fact that virtually anyone can create an account with a temporary email, enabling cybercriminals to quickly and easily publish malicious extensions that end up listed on the Marketplace.

In their report, Aqua Security uploaded a proof-of-concept demonstrating how a malicious extension could impersonate a legitimate one. This particular case involved employing 'typosquatting' (using simple typos) in the URL. Goldman explained that when the word 'pretier' is typed instead of the correct 'prettier', only the masquerading extension appears as a result.

Furthermore, the researchers raised concerns about the Marketplace's verification process, where a blue checkmark is displayed not for verifying the authors' true identity but for confirming the publisher's ownership of any domain. This loophole potentially endangers users' trust in the platform and exposes them to a higher level of risk.

Malignant packages frequently find their way into package managers such as NPM. Aqua Security mentions the possibility of legitimate extension developers inadvertently incorporating malicious dependencies into their work, thereby compromising it.

The findings of this research underscore the ever-growing need for developers to thoroughly scrutinize both the extensions they install and the packages they use. Furthermore, it is vital for platforms like Visual Studio Marketplace to improve their verification process and maintain a secure environment for users.

In this rapidly evolving digital landscape, no-code and low-code development platforms like appmaster.io>AppMaster offer a streamlined approach to creating secure, scalable applications. With AppMaster's comprehensive platform, users can create visually designed data models, business processes, and endpoints for backend, web, and mobile applications. A vigilant approach to application security, combined with the use of reliable platforms like appmaster.io>AppMaster, will go a long way in combating emerging cyber threats and ensuring the security of application development.

Easy to start
Create something amazing

Experiment with AppMaster with free plan.
When you will be ready you can choose the proper subscription.

Get Started