Threat Advisory: 7Zip Vulnerability CVE-2025-11001
A new 7-Zip vulnerability (CVE-2025-11001) enables directory traversal and remote code execution. UltraViolet Cyber explains risks and how to remediate.
Find flaws in web, mobile, and IoT applications.
Expose risks in AWS, Azure, and GCP environments.
Ongoing testing to catch real-world vulnerabilities as they appear.
Live-fire exercises to sharpen detection and response.
Time-boxed security assessments across networks, apps, and infrastructure.
Simulated attacks to test detection and incident response.
Named security experts integrated seamlessly into your team.
Real-time detection and automated threat response.
24x7 monitoring and response by expert analysts.
Nonstop scanning to prioritize and reduce risk.
Ongoing scanning, triage, and compliance tracking.
Unified security platform powering all UV services.
Cross-platform toolkit for advanced red team ops.
Secure your code, infrastructure, and deployment pipelines before attackers exploit them.
Feb 3-5, 2026
Feb 12, 2026
Feb 19, 2026
UltraViolet Cyber is a practitioner-led MSSP delivering offensive and defensive security to Global 2000 and Federal clients. Built by former intelligence operators, we unify application security, red teaming, detection, and engineering under one roof. Our UV Lens platform replaces silos with integrated, outcome-driven operations.
UltraViolet Cyber
January 28, 2026
Malicious Visual Studio Code extensions pose a direct and scalable threat to enterprise development environments by exploiting trusted marketplaces and developer workflows to gain persistent access to sensitive code, credentials, and intellectual property. Because these extensions operate inside sanctioned tools and inherit developer privileges, they can bypass many traditional security controls while enabling long-term surveillance and data exfiltration. Addressing this risk requires organizations to treat developer tooling as a critical part of the enterprise attack surface rather than an individual user choice.
What UltraViolet Cyber is Doing
Aggregating threat intelligence from myriad sources and applying the most up-to-date knowledge to proactive threat hunting and response.
Malicious Visual Studio Code extensions represent a growing and underappreciated risk to enterprise environments as threat actors increasingly target developer tooling rather than traditional infrastructure. Recent campaigns have demonstrated how attackers can distribute malicious extensions through trusted marketplaces by disguising them as productivity or AI-assisted coding tools. Recent examples include the China-Nexus AI-branded extensions “ChatGPT-中文版” and “ChatMoss” (AKA: “CodeMoss”), which have both achieved widespread adoption while embedding covert surveillance capabilities within developer workflows.
A defining characteristic of these malicious extensions is their dual-use functionality. They provide legitimate-appearing AI assistance features that integrate cleanly into daily development activity, while simultaneously executing hidden logic that monitors open files, captures source code, and silently transmits collected data to attacker-controlled infrastructure. This blended behavior allows malicious activity to persist over long periods without raising immediate suspicion from users or security controls.
This activity highlights a broader supply-chain weakness within IDE ecosystems. VS Code extension marketplaces prioritize accessibility and scale, relying on trust signals such as popularity and user ratings rather than comprehensive security validation. Threat actors exploit this model by publishing extensions that appear benign, positioning themselves as productivity enhancements while concealing malicious intent beneath functional code.
Developer workstations are particularly attractive targets because they concentrate sensitive enterprise assets. Extensions operate inside approved IDE processes, inherit developer permissions, and are granted broad access to repositories, configuration files, and embedded secrets by design. Because this activity occurs within trusted tools, it often bypasses endpoint and network defenses that are not tuned to inspect IDE extension behavior.
The enterprise impact extends well beyond immediate data leakage. Exfiltrated source code can reveal proprietary algorithms, authentication flows, API keys, and architectural decisions that may be reused for future intrusion or supply-chain compromise. In environments with shared repositories or integrated CI/CD pipelines, exposure originating from a single developer host can propagate across teams and downstream systems.
Adversary techniques observed in malicious extensions reflect increasing sophistication. Attackers rely on obfuscation, encoded data transfer, dynamic execution paths, and staged functionality to reduce detectability and complicate forensic analysis. By embedding malicious logic alongside legitimate features, they delay discovery until meaningful volumes of sensitive data have already been compromised.
From a strategic security perspective, malicious IDE extensions elevate developer environments into a tier-one enterprise risk domain. Compromised tools undermine secure development practices, introduce persistent exposure into the software lifecycle, and erode confidence in internally developed software artifacts. This represents a shift from opportunistic endpoint compromise to deliberate targeting of the software creation process itself.
Addressing this ongoing threat requires security leadership to treat IDE extensions as critical components of their security posture rather than optional developer conveniences. Centralized governance, strict extension allowlisting, and behavioral monitoring of developer environments are essential to reducing risk. Without explicit controls and visibility, malicious extensions will continue to provide adversaries with stealthy and scalable access to enterprise organizations through their most trusted technical users.
Modern integrated development environments have become a high-value attack surface because they sit at the convergence of source code, credentials, cloud access, and build systems. IDEs routinely handle proprietary logic, authentication secrets, infrastructure configuration files, and deployment pipelines, often with direct access to production or pre-production environments. When an attacker gains a foothold inside an IDE through a malicious extension, they are no longer attacking an endpoint in isolation; they are effectively operating from within the enterprise software supply chain itself, with visibility into how applications are built, secured, and deployed.
VS Code extensions amplify this risk because they are frequently installed with minimal scrutiny and broad permissions, particularly in fast-moving engineering teams. Marketplace vetting is limited, and extensions can be published by unknown or pseudonymous developers, forked from legitimate projects, or quietly updated after gaining user trust. The rapid adoption of AI-branded developer tools further compounds the problem, as developers are incentivized to install extensions promising productivity gains without fully understanding the scope of data access they grant. This creates a low-friction path for malicious or compromised developers to introduce surveillance and exfiltration capabilities directly into trusted workflows.
This threat model is not theoretical and mirrors historical attacks against developer ecosystems. Past incidents involving malicious NPM and PyPI packages, poisoned browser extensions, compromised IDE plugins, and build-time backdoors demonstrate how development tools are repeatedly leveraged for scalable compromise. IDE-focused attacks represent an evolution of these techniques, shifting from dependency poisoning to interactive, real-time access to developer activity. For enterprise organizations, this underscores why development environments must be governed with the same rigor as production systems, as weaknesses at the IDE layer can silently undermine every downstream security control.
We’re here to help. Get in touch for an initial conversation with one of our security experts and learn more about how UltraViolet Cyber can help you take cyber readiness and resilience to new levels.