this post was submitted on 10 Jun 2024
236 points (94.7% liked)

Programming

17354 readers
560 users here now

Welcome to the main community in programming.dev! Feel free to post anything relating to programming here!

Cross posting is strongly encouraged in the instance. If you feel your post or another person's post makes sense in another community cross post into it.

Hope you enjoy the instance!

Rules

Rules

  • Follow the programming.dev instance rules
  • Keep content related to programming in some way
  • If you're posting long videos try to add in some form of tldr for those who don't want to watch videos

Wormhole

Follow the wormhole through a path of communities !webdev@programming.dev



founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Kuinox@lemmy.world 48 points 5 months ago (5 children)

Fake news headline. There is no virus installed on millions of computer.
An extension typosquatting an extension with million of install managed to be installed a few hundred of times.

[–] savedbythezsh@sh.itjust.works 39 points 5 months ago (1 children)

I believe they're referring to lower down in the article, where the researchers analyzed existing extensions on the marketplace:

After the successful experiment, the researchers decided to dive into the threat landscape of the VSCode Marketplace, using a custom tool they developed named 'ExtensionTotal' to find high-risk extensions, unpack them, and scrutinize suspicious code snippets.

Through this process, they have found the following:

  • 1,283 with known malicious code (229 million installs).
  • 8,161 communicating with hardcoded IP addresses.
  • 1,452 running unknown executables.
  • 2,304 that are using another publisher's Github repo, indicating they are a copycat.
[–] Kuinox@lemmy.world 4 points 5 months ago (1 children)

If you look at the code of one of the "malicious code", it hit a ... local IP, not a remote one.

[–] lowleveldata@programming.dev 19 points 5 months ago (2 children)

Does that mean the hacker is in my room??

[–] noobface@lemmy.world 7 points 5 months ago

We're seeing connections from IP addresses that aren't even routable on the internet. We're compromised. Time to format.

[–] QuadriLiteral@programming.dev 2 points 5 months ago

Turns out you were the hacker all along

[–] wewbull@feddit.uk 21 points 5 months ago (2 children)

I wouldn't be so quick to write it off.

It's a proof of concept showing the weaknesses in Microsoft's vetting process for extensions published on the store. They then used the process to get pseudo-malicious code inside hundreds of organisations (not hundred of installs) some of which are high profile.

[–] FizzyOrange@programming.dev 3 points 5 months ago (1 children)

Microsoft doesn't have a vetting process for publishing extensions in the store. Maybe the failure is that people assume they do?

[–] Miaou@jlai.lu 1 points 4 months ago (1 children)

Surely you mean "that Microsoft does not make it clear that they don't"?

[–] FizzyOrange@programming.dev 1 points 4 months ago* (last edited 4 months ago)

Maybe, but I think the only app store that does vet apps is the Apple one, so that should be the default expectation.

And I think even they wouldn't manually look for something like this. They're mainly concerned about people breaking the commercial rules.

[–] Kuinox@lemmy.world -4 points 5 months ago* (last edited 5 months ago)

inside hundreds of organisations (not hundred of installs)

At the time of the article, the extension listed around 300 hundred installation on the VS marketplace. There is a lot of bots downloading packages, one extension i contribute to, and nobody use it except 3 peoples, have been indicated to be downloaded 238 times.

If you look at the number of extensions available on the vscode marketplace, and the false positive they listed as "malicious code" (read the code attentively), I'm sure my own extension will show up in their "malicious code" (it isn't)

[–] kinttach@lemm.ee 6 points 5 months ago (1 children)

Their findings included an extension that opens an obvious reverse shell.

[–] Kuinox@lemmy.world -3 points 5 months ago (1 children)

They made themselves the extensions.
If you are talking about the other reverse shell, it hit a local IP address.

[–] kinttach@lemm.ee 4 points 5 months ago (1 children)

True, it’s a private (not local) IP. It could easily have connected to a remote system, as their proof-of-concept did.

This code execs cmd.exe and pipes output to and from a hardcoded IP. That’s pretty weird. What’s running on that IP? How does the extension know something is there?

It looks like VS Code has no review — human or automated — or enforced entitlement system that would have stopped this or at least had someone verify it was legit.

[–] Kuinox@lemmy.world -2 points 5 months ago (1 children)

Thing is, tons of code extensions have an RCE in one form or another, but they always hit a localhost, or configurable IP. How do there automated analysis did any difference ?
Tons of extensions summon the cmd to summon the language devtools, their automated analysis flagged tons of package and they infer millions of infeections from that.

[–] ArcaneSlime@lemmy.dbzer0.com 1 points 4 months ago (1 children)

infeections

Since I read this I can't stop picturing you as Peter Lorre lmao.

[–] Kuinox@lemmy.world 2 points 4 months ago (1 children)

Damn now I noticed i did tons of mistake/types there ^^'.

[–] ArcaneSlime@lemmy.dbzer0.com 1 points 4 months ago

Lol it was just one of those things where I read it in his voice for that word.

[–] trolololol@lemmy.world 5 points 5 months ago (1 children)
[–] Skydancer@pawb.social 12 points 5 months ago (1 children)

Except their summary is wrong. The researchers went on to search other extensions for known malicious code, and found it in thousands of extensions with tens of millions of total installs.

[–] Kuinox@lemmy.world -4 points 5 months ago (1 children)

I hopped people here would notice that their "malicious code" detection is totally bogus when the malicious code highlighted hit a local IP address.

[–] Skydancer@pawb.social 2 points 5 months ago (1 children)

Good point. That was in the "static IP" category and not counted in the 200+ million install "malicious code" category, though. It could be a warning sign of false positives, but the example was such a small snippet it could also be opening after a VPN is established. That example was supposedly part of code that opens a connection for shell access from the other end, but without more details it's not really possible to say.

[–] Kuinox@lemmy.world -1 points 5 months ago

Tons of devtools summons cmd.exe and do networks. Their claim is that more than 10% of the vscode marketplate is malicious package (i just divided the number of extensions they says is malicious, by the number of extensions)

[–] laughterlaughter@lemmy.world -1 points 5 months ago (1 children)

Did you really have to use that stupid "fake news headline" phrase? Gross.

[–] Kuinox@lemmy.world 1 points 5 months ago

Thanks you too