Executive Summary
In January 2026, security researchers uncovered that two AI coding assistant extensions, 'ChatGPT - 中文版' and 'ChatMoss (CodeMoss)', available on the Visual Studio Code Marketplace, were surreptitiously exfiltrating developers' source code to servers in China. These extensions, collectively installed by approximately 1.5 million users, functioned as advertised but secretly transmitted entire file contents and user data without consent. The campaign, dubbed 'MaliciousCorgi', exploited the trust developers place in marketplace extensions, leading to significant exposure of proprietary code and sensitive information.
This incident underscores the escalating risks associated with supply chain attacks targeting developer tools. The widespread adoption of AI-powered extensions, combined with insufficient vetting processes in extension marketplaces, has created a fertile ground for malicious actors. Organizations must prioritize stringent security assessments of third-party tools to safeguard intellectual property and maintain operational integrity.
Why This Matters Now
The 'MaliciousCorgi' campaign highlights the urgent need for enhanced security measures in software development environments. As AI coding assistants become integral to development workflows, their potential misuse poses significant threats to data security and intellectual property. Immediate action is required to implement robust vetting processes and educate developers on the risks associated with third-party extensions.
Attack Path Analysis
Malicious AI coding assistant extensions were installed by over 1.5 million developers, leading to unauthorized data exfiltration to servers in China. The extensions exploited their integration within development environments to escalate privileges and access sensitive code repositories. They moved laterally across systems by embedding themselves into various projects and development workflows. The extensions established command and control channels by covertly transmitting data to external servers. They exfiltrated sensitive code and intellectual property without detection. The impact included significant data breaches, potential intellectual property theft, and compromised software supply chains.
Kill Chain Progression
Initial Compromise
Description
Developers unknowingly installed malicious AI coding assistant extensions from the official VSCode Marketplace, believing them to be legitimate tools.
MITRE ATT&CK® Techniques
Techniques identified for SEO/filtering; full STIX/TAXII enrichment may be added later.
Application Layer Protocol
Exfiltration Over C2 Channel
Valid Accounts
Obtain Capabilities: Artificial Intelligence
Exploitation for Client Execution
Credentials from Password Stores
Exfiltration Over Web Service
Indicator Removal on Host
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Protect stored cardholder data
Control ID: 3.4
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Data Protection
Control ID: 3.1
NIS2 Directive – Security of Network and Information Systems
Control ID: Article 21
ISO/IEC 27001 – Change Management
Control ID: A.12.1.2
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Direct exposure to supply-chain compromise through AI coding assistants exfiltrating proprietary source code to China, requiring enhanced egress security and zero trust segmentation.
Financial Services
Critical risk from code exfiltration containing financial algorithms and customer data processing logic, violating compliance frameworks and enabling competitive intelligence theft.
Health Care / Life Sciences
HIPAA compliance violations through medical software code exposure, potentially revealing patient data processing methods and proprietary healthcare algorithms to foreign adversaries.
Defense/Space
National security threat from military and aerospace code exfiltration to China, compromising classified systems design and defense capabilities through compromised development tools.
Sources
- AI Coding Assistants Secretly Copying All Code to Chinahttps://www.schneier.com/blog/archives/2026/02/ai-coding-assistants-secretly-copying-all-code-to-china.htmlVerified
- Malicious VS Code AI Extensions Harvesting Code from 1.5M Devshttps://www.koi.ai/blog/maliciouscorgi-the-cute-looking-ai-extensions-leaking-code-from-1-5-million-developersVerified
- Malicious Microsoft VSCode AI extensions might have hit over 1.5 million usershttps://www.techradar.com/pro/security/malicious-microsoft-vscode-ai-extensions-might-have-hit-over-1-5-million-usersVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the malicious extensions' ability to escalate privileges, move laterally, and exfiltrate sensitive data, thereby reducing the overall impact of the attack.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The malicious extensions' ability to establish unauthorized connections may have been constrained, reducing the risk of initial compromise.
Control: Zero Trust Segmentation
Mitigation: The extensions' ability to access sensitive code repositories and developer credentials would likely have been constrained, reducing the scope of privilege escalation.
Control: East-West Traffic Security
Mitigation: The extensions' ability to propagate across systems and access multiple codebases would likely have been constrained, reducing the scope of lateral movement.
Control: Multicloud Visibility & Control
Mitigation: The extensions' ability to establish covert channels to external servers would likely have been constrained, reducing the risk of unauthorized data transmission.
Control: Egress Security & Policy Enforcement
Mitigation: The extensions' ability to exfiltrate sensitive code to external servers would likely have been constrained, reducing the risk of data loss.
The overall impact of the attack would likely have been reduced, limiting data breaches and protecting the software supply chain.
Impact at a Glance
Affected Business Functions
- Software Development
- Intellectual Property Management
- Data Security
Estimated downtime: N/A
Estimated loss: N/A
Potential exposure of proprietary source code and intellectual property from approximately 1.5 million developers.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict unauthorized access within development environments.
- • Enforce Egress Security & Policy Enforcement to monitor and control outbound traffic from development tools.
- • Utilize Threat Detection & Anomaly Response systems to identify and respond to unusual activities within development workflows.
- • Apply Inline IPS (Suricata) to detect and prevent known exploit patterns and malicious payloads.
- • Regularly audit and validate third-party extensions and tools to ensure they do not introduce security vulnerabilities.

