The package was published on npm, the original extension, has a private component on npm with a similar name to that package, and that the squat the attacker tried to take advantage of
We discover a fake vscode extension that serves a multi-stage malware on npm, Inc.
The package uses javascript obfuscation for downloading the first stage of the malware, than it uses a heavily obfuscated batch file to conntinue into the second phase.
Lastly it leverages preconfigured ScreenConnect remote desktop installer to communicate with the compromised machine.
Hi guys, I'd like to introduce my new learning platform - LLM Security Labs.
This hands-on platform focused on the owasp top 10 for llm risks, where each risk has it own's lab in order to understand each risk with practical challenges, instead of just reading articles.
Hope you will enjoy that, would appreciate your feedback
Read the short story here - https://www.linkedin.com/posts/tom-abai-a4862915a_osssupplyc...