tuckner
@johntuckner.me
📤 768
📥 292
📝 445
Working on finding bad software extensions. More at:
https://secureannex.com
If you've had to listen to me over the last couple months, it's likely you would've hear me say that all of our most important apps will have extensions or plugins for integration. Think we're learning from past mistakes?
6 days ago
0
0
0
A browser extension, PasteReady, was listed for sale last May became malicious after an ownership transfer on December 27th. Many organizations have been impacted by extensions which changed hands.
@secureannex.com
watches for transfers and warns you in advance!
www.linkedin.com/pulse/paster...
loading . . .
PasteReady: Danger of sold extensions
The PasteReady browser extension (dcbikjphkkgmgmjoohmbnhccbndgpmin) was sold and the new owner pushed malware immediately after taking ownership. PasteReady was put up for sale on http://extensionhub.
https://www.linkedin.com/pulse/pasteready-danger-sold-extensions-john-tuckner-3x9pc/?trackingId=2SQl5CStSZaQ9b65g0cxnQ%3D%3D
8 days ago
0
0
0
Pyrefly - Python Language Tooling by Meta is the 4th most used extension in Open VSX. Be careful downloading the 'Pro' version in Cursor hoping you'll get some extra features, it is published by 'casendsabotnu954' who just joined GitHub the other day. Textbook cloning and staging behavior!
10 days ago
0
0
0
Loving a new detection that identifies code extensions published by new and lightly used GitHub accounts.This time it instantly caught an extension impersonating JFrog which already has over 10k downloads.
16 days ago
0
2
1
Not the "pulling a Rabbit out of a hat" magic trick that most want. This Firefox extension completely changes from a "Simple Label Editor" to a Rabby wallet stealer overnight.
loading . . .
19 days ago
0
1
1
A browser extension with over a million users is poaching the prompts of leading AI chat tools. SimilarWeb loads obfuscated remote configuration to collect the prompts, responses and metadata of your conversations. Your private thoughts are analytics companies gain.
secureannex.com/blog/prompt-...
loading . . .
Prompt poaching runs rampant in extensions
Web analytics companies are using browser extensions to monetize your most private thoughts
https://secureannex.com/blog/prompt-poaching/
26 days ago
0
0
0
These code comments are an improvement from: 1. Request malware 2. Download malware 3. Make malware executable 4. Run malware This is the extent of the extension available in the VS Marketplace. Installs a Mythic agent from the C2.
about 1 month ago
0
3
0
Monitoring a large influx of AI slop extensions that are reposting a marginally refactored but known malicious package. The marketplace listings are packed with emojis and a couple sections of 'features'. This one made the mistake of linking to an already known piece of malware.
about 2 months ago
0
2
0
Welcome to Antigravity the newest most advanced agentic AI development tool by Google... ... uses Open VSX for extensions and shows malicious listings to users.
about 2 months ago
0
1
0
Changing how an extension looks in a marketplace doesn't require new code to be pushed. Check out the magic when this "Test Extension" magically turns into a "solidity" extension after being published. Review the full lineage of a marketplace listing using the new date picker in Secure Annex.
loading . . .
about 2 months ago
0
2
0
Vibed coded malicious extensions are getting out of hand! This 'theme' downloads a malicious zip, unpacks it, and runs it silently with PowerShell.
about 2 months ago
0
1
0
16 Firefox extensions with the almost the same name, same permhash requesting the most sensitive permission combinations like <all_urls> and cookies. Something being staged?
about 2 months ago
0
1
0
Glassworm returned in a big way during the holiday. We're tracking 23 code extensions across the VS Marketplace and Open VSX which copy popular extensions, evade filters, manipulate their download counts, and then update with sinister malware.
secureannex.com/blog/glasswo...
loading . . .
Glassworm stays prevalent
Glassworm attacks look to take full advantage of the holidays
https://secureannex.com/blog/glassworm-continued
about 2 months ago
0
2
2
Malware in Open VSX and available in Cursor right now tailwind-nuxt.tailwindcss-for-react flutcode.flutter-extension yamlcode.yaml-vscode-extension
about 2 months ago
1
0
0
Unprecedented code extension attacks this week. All are name squatting on popular tools. Only a couple have had malware deployed, many are still staging, few have been removed from marketplaces. There may be more coming. VS Marketplace: iconkieftwo.icon-theme-materiall 1/3
about 2 months ago
1
0
0
Imagine how useful it would be if the Chrome Web Store showed you users over time. This ad blocker went from 0 to 40,000 users overnight! 🤔
2 months ago
0
1
0
Going to have to reread Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson in order to keep up with the advanced tactics we're starting to see in VS Code extension malware.
2 months ago
0
3
0
Really excited to being supporting
crxaminer.tech
with some Secure Annex details. Looking forward to more opportunities to get more information on browser extensions out there!
2 months ago
0
1
0
Mackenzie Jackson is raising a red flag about the risks IDE extensions present. Always on top of the top industry trends. Thanks for letting me share a bit!
m.youtube.com/watch?v=FiJ_...
loading . . .
- YouTube
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
https://www.youtube.com/watch?app=desktop&v=FiJ_mqkEpsI&pp=0gcJCR4Bo7VqN5tD
2 months ago
0
1
0
The extension was approved, now what? Are you going back tomorrow to see if it changed? You know they auto update instantly right? Rolling out to Secure Annex - code change alerts. This compares past code with additional context to understand how an extension is changing over time. Catch bad quick!
2 months ago
0
2
0
A brand new unlisted extension with 100,000 users? 41 ratings? Must be really valuable. Nope - completely manipulated stats and it doesn't even contain real code. It exists only to collect your searches and earn Bing Rewards.
2 months ago
1
6
5
We've found code extensions openly call themselves malware in the VS Code marketplace recently and now browser extensions posing as known malicious remote access tools to the Chrome Web Store. What gives?
2 months ago
0
0
0
Attracting a lot of fans these days
2 months ago
0
1
0
Did you know you can manage an allowlist of MCP extensions and MCP servers (yes they're different) used by Claude desktop? If you're a Claude Enterprise customer you can configure these settings centrally and roll them out. This is separate from Claude Code though. Are you using this feature?
2 months ago
0
0
0
Powerful new Detections are added to Secure Annex. These are already catching subtle exploits like unicode extension names that evade other filters, manipulated download counts, and combinations of suspicious signatures in code.
3 months ago
0
0
0
Two of these Cursor extensions will compromise your device the second you hit install. Good luck!
3 months ago
0
1
1
Ridiculously cool that Tines is able to connect to MCP servers now. Understand entirely what any of the browser or code extensions you use might actually be doing. Orchestrate your extension review process or check if "Hello Kitty - You Glow Girl Cute Live Wallpaper" is more than what it says.
loading . . .
3 months ago
1
1
0
Ransomware has appeared in the VS Marketplace and makes me worry. Clearly created through AI, it makes many mistakes like including decryption tools in extension. If this makes it into the marketplace through, what impact would anything more sophisticated cause?
secureannex.com/blog/ransomv...
loading . . .
RansomVibing appears in VS Code extensions
Vibe coded ransomware has successfully been published to the VS Code extension marketplace
https://secureannex.com/blog/ransomvibe
3 months ago
0
4
2
reposted by
tuckner
Catalin Cimpanu
3 months ago
-Couple loses fortune to scammers -Valid accounts still rule the day for initial access -Open VSX rotate leaked creds -ZeroAccess botnet dev is now a software dev -BadCandy flourishes in Australia -New Katreus miner -Malware reports on Aura Stealer, SectopRAT, SleepyDuck RAT, OysterLoader
1
6
4
From North Korean tradecraft to being used in Cursor extensions in two weeks. Etherhiding is a technique where malware can use Ethereum contracts as a resilient C2 channel detailed by Google Oct 15th. It is now appearing in code extensions with the first sighting November 1st.
3 months ago
1
2
0
From North Korean tradecraft to being used in Cursor extensions in two weeks. Etherhiding is a technique where malware can use Ethereum contracts as a resilient C2 channel detailed by Google Oct 15th. It is now appearing in code extensions with the first sighting November 1st.
3 months ago
1
0
1
The SleepyDuck code extension malware is an advanced remote access trojan allowing for remote command execution on any endpoint that installs it. Take down the C2 server? It uses an Ethereum contract to update its settings to a new endpoint.
secureannex.com/blog/sleepyd...
loading . . .
SleepyDuck malware invades Cursor through Open VSX
The advanced SleepyDuck IDE extension RAT uses Ethereum contracts for persistence.
https://secureannex.com/blog/sleepyduck-malware
3 months ago
0
1
3
If you thought you were ahead by using Windsurf... nope! Check out the
@secureannex.com
extension to protect yourself from malicious extensions right now.
open-vsx.org/extension/se...
add a skeleton here at some point
3 months ago
0
0
0
Today's edition of pick the right solidity in Cursor. Yes - this IS different than yesterday
3 months ago
0
0
1
Three malicious solidity extensions were published to Open VSX today. Would you be able to tell which is the real one in Cursor? This repeated behavior has been going on since June and anyone can detect it by just matching against 'solidity'. When will progress be made?
3 months ago
1
0
0
Most of us just want a Pikachu sprite dancing on our code, but threat actors want to spoil the fun. Yesterday five malicious VS Code extensions were published, one a Pokemon theme and syntax highlighter, but instead disable Windows Defender and installs a cryptominer
secureannex.com/blog/pokemon...
3 months ago
0
0
0
My first response from VS Marketplace support is requesting supporting additional evidence I have that this listing is malware. If anyone can publish an extension with admittedly malicious intent with no response, what does that do for the health of the marketplace?
add a skeleton here at some point
3 months ago
1
1
1
The "test malware" made it's way into the VS Marketplace easily
3 months ago
0
2
1
🙄🙄🙄
3 months ago
1
0
0
New docs available for Secure Annex! A bunch of new integration and setup guides to integrate with your environment.
docs.secureannex.com
3 months ago
0
0
0
Dangerous namesquat for Tailwind just published to Open VSX currently. Caught less than an hour after publishing. Tagged and blocked in Secure Annex.
3 months ago
0
0
0
reposted by
tuckner
Zack Whittaker
3 months ago
New, by me at
this.weekinsecurity.com
: If you're not using ad blockers, you should be! In this deep-dive blog, I explain why ad blockers are critical for your online security and privacy, what threats ad blockers can help defend against, and we'll explore at some of the best ad blockers out there.
loading . . .
Why ad blockers are a top security and privacy defense for everyone
Ad blockers can help defend against some of the top hacks, scams, and surveillance today. Here are some of the best ad blockers that you can use.
https://this.weekinsecurity.com/why-ad-blockers-are-a-top-security-and-privacy-defense-for-everyone/
2
66
27
reposted by
tuckner
Jake Williams
3 months ago
None other than
@cnn.com
serving malware through the ads on its site...
5
39
6
Interesting piece of protestware in the browser extension space. Injects a script that autoplays the Ukrainian national anthem on '.ru' domains.
4 months ago
0
0
0
Secure Annex now has a code editor extension to help manage other extensions. One installation will protect VS Code, Cursor, and Windsurf. Any extension known to be malicious/suspicious will be uninstalled immediately from your editors. Get in touch if you're interested!
4 months ago
0
2
0
Running statistics comparing when a browser extension is reported malicious/suspicious compared to when it is removed from the Chrome Web Store. Here is the breakdown: Still active: 68.8% 91-365 days: 19.1% 31-90 days: 5.8% Same day or 1 day: 2.9% 8-30 days: 2.3% 2-7 days: 1.2%
4 months ago
0
1
2
This "Calculator" Chrome extension (60k+ users) markets itself as a simple iOS-style calculator with "basic arithmetic operations" with the ability to "open calculator directly on website pages." Could that be all?
4 months ago
1
1
0
The Secure Annex extension is available to protect against other extensions! When an extension is found to be malicious, Secure Annex will prevent it from running. A great option for teams that do not have complete control with managed browsers. If you're interested, get in touch!
4 months ago
0
1
1
Integrations are coming to Secure Annex! Easily gather all of the extensions in your environment from any source. Simply send data to an endpoint and pick out the data location. Some preconfigured options include Fleet and LimaCharlie! Get in touch if you want to try it out.
4 months ago
0
0
0
I put together a browser extension analysis workshop for ContinuumCon and went over a section of the material live! The material and labs are still available at ContinuumCon or feel free to message if you would like a specialized training!
www.youtube.com/watch?v=hhnm...
loading . . .
CC2025 Day 1.4 - Demystifying Browser Extensions
The #cybersecurity conference that "never ends!" full 3 day stream recordings. Access to the conference workshop labs, practical content, and Blue Team Defensive CTF can be accessed for as long as…
https://www.youtube.com/watch?v=hhnmQ1IuEdc
4 months ago
0
1
0
Load more
feeds!
log in