HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Malicious VS Code Extension Uses Solana Blockchain to Deploy NodeJS Stealer Targeting Developers

Bitdefender researchers uncovered a counterfeit VS Code R‑language extension that fetches encrypted JavaScript from the Solana blockchain, decrypts it on the host, and runs a NodeJS stealer to exfiltrate Chromium browser credentials. The campaign targets developer workstations, uses a hidden PowerShell scheduled task for persistence, and excludes Russian systems.

🛡️ LiveThreat™ Intelligence · 📅 March 19, 2026· 📰 bitdefender.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
bitdefender.com

Malicious VS Code Extension Uses Solana Blockchain to Deploy NodeJS Stealer Targeting Developers

What Happened – A counterfeit “R language support” extension for Visual Studio Code (named reditorsupporter.r‑vscode‑2.8.8‑universal) was discovered delivering a multi‑stage NodeJS credential stealer. The loader fetches encrypted JavaScript payloads from Solana blockchain transactions, decrypts them on the host, and executes code that harvests Chromium‑based browser passwords, cookies, and other sensitive data. Persistence is achieved via a hidden PowerShell scheduled task.

Why It Matters for TPRM

  • Supply‑chain abuse of a trusted IDE extension bypasses traditional endpoint controls.
  • The blockchain‑based payload distribution makes takedown and attribution extremely difficult.
  • Compromised developer machines can expose privileged API keys, cloud credentials, and downstream third‑party services.

Who Is Affected – Software development teams, SaaS providers, cloud‑native enterprises, and any organization that allows developers to install VS Code extensions.

Recommended Actions

  • Block installation of unsigned or third‑party VS Code extensions on corporate workstations.
  • Enforce application whitelisting and monitor for unexpected scheduled tasks.
  • Conduct credential rotation for any API keys or cloud secrets stored on developer machines.

Technical Notes – The attack vector is a malicious IDE extension (MALWARE) that retrieves its payload from Solana blockchain transactions (no CVE involved). The stolen data includes saved Chromium passwords, session cookies, and other browser artifacts. Source: Bitdefender Labs

📰 Original Source
https://www.bitdefender.com/en-us/blog/labs/windsurf-extension-malware-solana

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.