Executive Summary

In January 2026, researchers at Koi Security discovered that two AI-powered Visual Studio Code (VSCode) Marketplace extensions—ChatGPT – 中文版 and ChatMoss (CodeMoss)—were secretly exfiltrating developer files and sensitive data to China-based servers. Together, these malicious extensions had been installed 1.5 million times and collected data using real-time file monitoring, workspace file harvesting, and covert user profiling via embedded commercial analytics SDKs. The compromised extensions transmitted not only source code but potentially included API keys, configuration, and credential files without user consent, representing a major supply-chain compromise in the software development ecosystem.

This incident highlights the persistent risks developers face from supply chain attacks through third-party plugins. As AI-driven code assistants surge in popularity, attackers are increasingly exploiting trusted extension marketplaces to deploy sophisticated data-stealing campaigns, raising urgent concerns for software security, compliance, and marketplace governance.

Why This Matters Now

With AI-powered developer tools seeing rapid adoption, malicious actors are targeting widely used marketplaces to propagate sophisticated spyware at scale. This breach underscores the urgent need for enhanced vetting, monitoring, and security controls in extension ecosystems to prevent source code exfiltration and supply chain compromise.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The incident exposed insufficient supply-chain monitoring, lack of privacy controls over developer data in transit, and missing vetting mechanisms that are required by NIST, PCI DSS, and HIPAA frameworks.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Zero Trust network segmentation, egress policy enforcement, cloud-native inline inspection, and microsegmentation could have limited the ability of the malicious extensions to exfiltrate data and communicate with attacker infrastructure, significantly reducing both exfiltration and C2 opportunities while preventing the spread of compromise within a developer environment.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: Inline enforcement of extension and application behaviors could block or alert on risky plugin code.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Least privilege and identity-based segmentation could block extensions from accessing unnecessary files and secrets.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Service-to-service traffic controls would prevent malicious extension-driven pivots.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: Centralized monitoring identifies and alerts on anomalous or unauthorized outbound connections.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Egress filtering and data loss prevention block unauthorized file transfers.

Impact (Mitigations)

Enforced firewall policy reduces the likelihood and scope of data loss.

Impact at a Glance

Affected Business Functions

  • Software Development
  • Intellectual Property Management
Operational Disruption

Estimated downtime: 7 days

Financial Impact

Estimated loss: $500,000

Data Exposure

Unauthorized access to proprietary source code, configuration files, and sensitive credentials, potentially leading to intellectual property theft and compromise of internal systems.

Recommended Actions

  • Enforce Zero Trust segmentation and least-privilege policies for developer workspaces to minimize extension access to sensitive files.
  • Implement strict egress filtering and application-aware outbound controls to prevent unauthorized extensions from transmitting data externally.
  • Deploy cloud-native real-time inspection and behavioral analytics to detect malicious extension or shadow AI activities.
  • Mandate visibility into east-west traffic and developer environment communications to identify and contain supply chain attacks early.
  • Regularly audit and monitor marketplace-sourced plugins/extensions and integrate CNSF controls for continuous compliance and risk mitigation.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image