tuckner
@johntuckner.me
📤 759
📥 292
📝 426
Working on finding bad software extensions. More at:
https://secureannex.com
Going to have to reread Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson in order to keep up with the advanced tactics we're starting to see in VS Code extension malware.
4 days ago
0
2
0
Really excited to being supporting
crxaminer.tech
with some Secure Annex details. Looking forward to more opportunities to get more information on browser extensions out there!
5 days ago
0
0
0
Mackenzie Jackson is raising a red flag about the risks IDE extensions present. Always on top of the top industry trends. Thanks for letting me share a bit!
m.youtube.com/watch?v=FiJ_...
loading . . .
- YouTube
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
https://www.youtube.com/watch?app=desktop&v=FiJ_mqkEpsI&pp=0gcJCR4Bo7VqN5tD
6 days ago
0
1
0
The extension was approved, now what? Are you going back tomorrow to see if it changed? You know they auto update instantly right? Rolling out to Secure Annex - code change alerts. This compares past code with additional context to understand how an extension is changing over time. Catch bad quick!
7 days ago
0
2
0
A brand new unlisted extension with 100,000 users? 41 ratings? Must be really valuable. Nope - completely manipulated stats and it doesn't even contain real code. It exists only to collect your searches and earn Bing Rewards.
10 days ago
1
6
5
We've found code extensions openly call themselves malware in the VS Code marketplace recently and now browser extensions posing as known malicious remote access tools to the Chrome Web Store. What gives?
12 days ago
0
0
0
Attracting a lot of fans these days
12 days ago
0
1
0
Did you know you can manage an allowlist of MCP extensions and MCP servers (yes they're different) used by Claude desktop? If you're a Claude Enterprise customer you can configure these settings centrally and roll them out. This is separate from Claude Code though. Are you using this feature?
13 days ago
0
0
0
Powerful new Detections are added to Secure Annex. These are already catching subtle exploits like unicode extension names that evade other filters, manipulated download counts, and combinations of suspicious signatures in code.
14 days ago
0
0
0
Two of these Cursor extensions will compromise your device the second you hit install. Good luck!
15 days ago
0
1
1
Ridiculously cool that Tines is able to connect to MCP servers now. Understand entirely what any of the browser or code extensions you use might actually be doing. Orchestrate your extension review process or check if "Hello Kitty - You Glow Girl Cute Live Wallpaper" is more than what it says.
loading . . .
17 days ago
1
1
0
Ransomware has appeared in the VS Marketplace and makes me worry. Clearly created through AI, it makes many mistakes like including decryption tools in extension. If this makes it into the marketplace through, what impact would anything more sophisticated cause?
secureannex.com/blog/ransomv...
loading . . .
RansomVibing appears in VS Code extensions
Vibe coded ransomware has successfully been published to the VS Code extension marketplace
https://secureannex.com/blog/ransomvibe
19 days ago
0
4
2
reposted by
tuckner
Catalin Cimpanu
21 days ago
-Couple loses fortune to scammers -Valid accounts still rule the day for initial access -Open VSX rotate leaked creds -ZeroAccess botnet dev is now a software dev -BadCandy flourishes in Australia -New Katreus miner -Malware reports on Aura Stealer, SectopRAT, SleepyDuck RAT, OysterLoader
1
6
4
From North Korean tradecraft to being used in Cursor extensions in two weeks. Etherhiding is a technique where malware can use Ethereum contracts as a resilient C2 channel detailed by Google Oct 15th. It is now appearing in code extensions with the first sighting November 1st.
21 days ago
1
2
0
From North Korean tradecraft to being used in Cursor extensions in two weeks. Etherhiding is a technique where malware can use Ethereum contracts as a resilient C2 channel detailed by Google Oct 15th. It is now appearing in code extensions with the first sighting November 1st.
21 days ago
1
0
1
The SleepyDuck code extension malware is an advanced remote access trojan allowing for remote command execution on any endpoint that installs it. Take down the C2 server? It uses an Ethereum contract to update its settings to a new endpoint.
secureannex.com/blog/sleepyd...
loading . . .
SleepyDuck malware invades Cursor through Open VSX
The advanced SleepyDuck IDE extension RAT uses Ethereum contracts for persistence.
https://secureannex.com/blog/sleepyduck-malware
22 days ago
0
1
3
If you thought you were ahead by using Windsurf... nope! Check out the
@secureannex.com
extension to protect yourself from malicious extensions right now.
open-vsx.org/extension/se...
add a skeleton here at some point
24 days ago
0
0
0
Today's edition of pick the right solidity in Cursor. Yes - this IS different than yesterday
24 days ago
0
0
1
Three malicious solidity extensions were published to Open VSX today. Would you be able to tell which is the real one in Cursor? This repeated behavior has been going on since June and anyone can detect it by just matching against 'solidity'. When will progress be made?
24 days ago
1
0
0
Most of us just want a Pikachu sprite dancing on our code, but threat actors want to spoil the fun. Yesterday five malicious VS Code extensions were published, one a Pokemon theme and syntax highlighter, but instead disable Windows Defender and installs a cryptominer
secureannex.com/blog/pokemon...
25 days ago
0
0
0
My first response from VS Marketplace support is requesting supporting additional evidence I have that this listing is malware. If anyone can publish an extension with admittedly malicious intent with no response, what does that do for the health of the marketplace?
add a skeleton here at some point
28 days ago
1
1
1
The "test malware" made it's way into the VS Marketplace easily
about 1 month ago
0
2
1
🙄🙄🙄
about 1 month ago
1
0
0
New docs available for Secure Annex! A bunch of new integration and setup guides to integrate with your environment.
docs.secureannex.com
about 1 month ago
0
0
0
Dangerous namesquat for Tailwind just published to Open VSX currently. Caught less than an hour after publishing. Tagged and blocked in Secure Annex.
about 1 month ago
0
0
0
reposted by
tuckner
Zack Whittaker
about 1 month ago
New, by me at
this.weekinsecurity.com
: If you're not using ad blockers, you should be! In this deep-dive blog, I explain why ad blockers are critical for your online security and privacy, what threats ad blockers can help defend against, and we'll explore at some of the best ad blockers out there.
loading . . .
Why ad blockers are a top security and privacy defense for everyone
Ad blockers can help defend against some of the top hacks, scams, and surveillance today. Here are some of the best ad blockers that you can use.
https://this.weekinsecurity.com/why-ad-blockers-are-a-top-security-and-privacy-defense-for-everyone/
2
66
27
reposted by
tuckner
Jake Williams
about 1 month ago
None other than
@cnn.com
serving malware through the ads on its site...
5
39
6
Interesting piece of protestware in the browser extension space. Injects a script that autoplays the Ukrainian national anthem on '.ru' domains.
about 1 month ago
0
0
0
Secure Annex now has a code editor extension to help manage other extensions. One installation will protect VS Code, Cursor, and Windsurf. Any extension known to be malicious/suspicious will be uninstalled immediately from your editors. Get in touch if you're interested!
about 2 months ago
0
2
0
Running statistics comparing when a browser extension is reported malicious/suspicious compared to when it is removed from the Chrome Web Store. Here is the breakdown: Still active: 68.8% 91-365 days: 19.1% 31-90 days: 5.8% Same day or 1 day: 2.9% 8-30 days: 2.3% 2-7 days: 1.2%
about 2 months ago
0
1
2
This "Calculator" Chrome extension (60k+ users) markets itself as a simple iOS-style calculator with "basic arithmetic operations" with the ability to "open calculator directly on website pages." Could that be all?
about 2 months ago
1
1
0
The Secure Annex extension is available to protect against other extensions! When an extension is found to be malicious, Secure Annex will prevent it from running. A great option for teams that do not have complete control with managed browsers. If you're interested, get in touch!
about 2 months ago
0
1
1
Integrations are coming to Secure Annex! Easily gather all of the extensions in your environment from any source. Simply send data to an endpoint and pick out the data location. Some preconfigured options include Fleet and LimaCharlie! Get in touch if you want to try it out.
about 2 months ago
0
0
0
I put together a browser extension analysis workshop for ContinuumCon and went over a section of the material live! The material and labs are still available at ContinuumCon or feel free to message if you would like a specialized training!
www.youtube.com/watch?v=hhnm...
loading . . .
CC2025 Day 1.4 - Demystifying Browser Extensions
The #cybersecurity conference that "never ends!" full 3 day stream recordings. Access to the conference workshop labs, practical content, and Blue Team Defensive CTF can be accessed for as long as…
https://www.youtube.com/watch?v=hhnmQ1IuEdc
2 months ago
0
1
0
How are folks finding what MCP servers are in use in their organizations? Not just remote ones, but local also. There are a ton of places where they are configured that I've seen even for just something like Claude.
2 months ago
1
0
1
reposted by
tuckner
LP
2 months ago
🚨 Think your browser extensions are harmless? Join
@johntuckner.me
for
@thorcollective.bsky.social
and learn how to hunt the dangerous ones before they hunt you:
thorcollective.substack.com/p/even-if-ma...
#cybersecurity
#infosec
#threathunting
#thrunting
loading . . .
Even if many plugins are fine, the bad ones are BAD
Sydney recently wrote a great piece about extensions and hunting for IDE plugins.
https://thorcollective.substack.com/p/even-if-many-plugins-are-fine-the
0
3
2
Not subscribed to the THOR Collective Dispatch yet? You might've missed my guest piece on hunting for bad browser extensions. Check if the extension your CFO installed to change text to Comic Sans is also taking screenshots of his Salesforce reports.
dispatch.thorcollective.com/p/even-if-ma...
2 months ago
0
2
1
The Secure Annex extension history graph now shows version, verdict, and availability elements now in addition to users. With this you can easily see when a new extension version is released, when it was labeled, and how long it can last in a marketplace before take down.
2 months ago
0
0
0
Salesloft reported that a GitHub compromise triggered their recent incident involving Drift. This has been my leading example of how a malicious browser extension can cause significant damage through capturing and replaying user sessions in GitHub.
youtu.be/h3vFGv8wxfM?...
loading . . .
Exploring Browser Extensions with John Tuckner
Watch this week's Defender Fridays with John Tuckner, Founder of Secure Annex, as we explore browser extensions and the risks they pose to your organization. Learn, share, and grow alongside…
https://youtu.be/h3vFGv8wxfM?t=444
3 months ago
0
1
0
Developers are now looking for improvements in Open VSX after a string of malicious extensions impersonating real ones were published. The malware has not been taken down after 3+ days. This is impacting the trust in the platform.
3 months ago
0
0
0
Six malicious extensions listed in Cursor and hosted on Open VSX. All are squatting on other packages and are showing above the safe versions they target.
3 months ago
2
15
6
Earlier solidity malware taken down from the Open VSX marketplace. The publisher was supposed to be removed. Different namespace, same publisher with more solidity malware.
open-vsx.org/extension/ki...
3 months ago
0
1
0
Another day, another solidity malware.
open-vsx.org/extension/Ju...
3 months ago
0
1
1
There has been an uptick in very simple extensions published to Firefox which redirect a user to a phishing page looking for wallet credentials when the extension icon is clicked. Many of these pages are hosted on Google sites. They extensions are removed quickly, but they must be successful.
3 months ago
0
1
0
Insane that this extension published today on the VS marketplace is showing 2.5 million installs, obviously manipulated. A copy of malicious extensions seen in Open VSX. The VS marketplace is no safe haven. VitalikButerin-EthFoundation.blan-co
marketplace.visualstudio.com/items?itemNa...
loading . . .
Solidity - Visual Studio Marketplace
Extension for Visual Studio Code - Solidity language for Ethereum, write smart contracts and more via Solidity
https://marketplace.visualstudio.com/items?itemName=VitalikButerin-EthFoundation.blan-co
3 months ago
1
8
3
DePIN stands for decentralized physical infrastructure networks. They operate through small rewards in exchange for making requests through your browser using extensions. We've identified 13 of these services with almost $100 million of venture capital funding them.
secureannex.com/blog/depin-b...
loading . . .
DePIN comes to browser extensions
Browser extensions have become a space for decentralized physical infrastructure (DePIN). How does that impact you?
https://secureannex.com/blog/depin-browser-extensions/
3 months ago
0
1
0
Many extensions override your default search provider sending your searches to a third parties before being redirected back to results. The search of choice is often Bing which provides rewards for referrals based on added identifiers. What do you think? Harmless or something to keep an eye on?
3 months ago
0
0
0
Checking back in on the 57 hidden tracking extensions with extreme permissions we found in April shows why organizations must act. 10 are still active! 22 were removed a week after reporting and 24 more in the past 2 months. Read about it here:
secureannex.com/blog/searchi...
3 months ago
0
10
3
Did you know Chrome Enterprise Core offers a free way to report on all of the extensions in your managed browsers? Try using its APIs to do regular enrichment of what your users have installed.
secureannex.com/blog/retriev...
loading . . .
Retrieve Extensions from the Chrome Enterprise API
A guide to retrieve installed extensions from the Google Chrome Enterprise API
https://secureannex.com/blog/retrieve-chrome-extensions
3 months ago
0
0
0
Yesterday I found a new set of malicious extensions in Open VSX. They start as "Test extensions" in the marketplace and then updates to include a new files execute from a Cloudflare worker. Some IOCs nomic-foundation.hardhat-solidity g83u[.]pages[.]dev/hjxuw1x[.]txt g83u[.]pages[.]dev/qp5tr4f[.]txt
3 months ago
1
0
0
Load more
feeds!
log in