Severity
critical
Records
1,500,000
Vector
Supply Chain — malicious VS Code marketplace extensions
Organization
Multiple Organizations
Incident Date
2026-01-15

What Happened

Security researchers discovered two malicious Visual Studio Code extensions—ChatMoss and ChatGPT中文版 (ChatGPT Chinese Version)—with a combined 1.5 million installations were systematically exfiltrating source code, API keys, and proprietary algorithms to servers in China while functioning as legitimate AI coding assistants.

Incident overview

AttributeDetails
ExtensionsChatMoss, ChatGPT中文版
Combined installs1,500,000
Data destinationChina-based servers
DisguiseAI coding assistants
Attack typeSupply chain / data exfiltration
DiscoveryFebruary 2026
AffectedDevelopers across enterprise, startup, open-source

Malicious extensions

ChatMoss

AttributeDetails
FunctionAI coding assistant
Installs~750,000 (estimated)
BehaviorCode exfiltration, behavioral tracking

ChatGPT中文版

AttributeDetails
FunctionChinese-language ChatGPT integration
Installs~750,000 (estimated)
Target audienceChinese-speaking developers
BehaviorCode exfiltration, analytics collection

Data exfiltration methods

Three-channel architecture

ChannelPurpose
Code contextAutocomplete sends code to external servers
Analytics trackingZero-pixel iframe loads Chinese analytics
File accessDirect exfiltration of source files

Analytics platforms used

PlatformType
Zhuge.ioChinese analytics
GrowingIOChinese analytics
TalkingDataChinese analytics
Baidu AnalyticsChinese analytics

The extensions embedded a “ChatMoss Data Tracking” interface that profiled developer behavior, device fingerprints, and workspace activity.

Data stolen

Source code

Data typeStatus
Code snippetsExfiltrated
Complete filesExfiltrated
Proprietary algorithmsExfiltrated
Project structuresExfiltrated

Credentials

Data typeStatus
API keysExfiltrated
Authentication tokensExfiltrated
Environment variablesPotentially exposed
Secrets in codeExfiltrated

Behavioral data

Data typeStatus
Device fingerprintsCollected
Workspace activityTracked
Coding patternsProfiled
Project metadataCollected

Attack sophistication

Blended functionality

AspectImplementation
Legitimate featuresWorking AI autocomplete
Malicious featuresData exfiltration
Detection evasionUseful functionality masks theft

The three-channel architecture indicates deliberate strategy to maximize data capture while avoiding detection by providing genuine value to users.

Impact assessment

Scope

FactorAssessment
Installations1.5 million
Organizations affectedThousands
Data exposureSource code, secrets, credentials
Investigation timelineMonths required

Affected environments

EnvironmentRisk
EnterpriseProprietary code exposure
StartupsIP theft
Open sourceContributor credential theft
Individual developersPersonal project exposure

Growing threat

YearMalicious extensions detected
202427
2025 (Jan-Oct)105
2026Trend continuing

ReversingLabs noted a steady rise in suspicious uploads to the VS Code Marketplace throughout 2025.

Remediation

Immediate actions

PriorityAction
CriticalRemove ChatMoss and ChatGPT中文版 extensions
CriticalRotate all API keys and tokens
CriticalAudit repository access logs
HighScan for China-based network connections
HighReview code for exposed secrets

Credential rotation

Credential typeAction
Cloud API keysRegenerate immediately
Database credentialsRotate
Service tokensRevoke and reissue
SSH keysConsider regeneration

Network monitoring

IndicatorAction
Connections to Chinese IPsBlock and investigate
Unusual outbound dataAlert and analyze
Extension network activityMonitor all extensions

Recommendations

For developers

PriorityAction
CriticalAudit installed VS Code extensions
CriticalRemove extensions with suspicious permissions
HighReview extension publishers before install
HighLimit extension network access where possible
MediumUse enterprise-approved extension lists

For organizations

PriorityAction
CriticalInventory all developer tool extensions
CriticalImplement extension allowlisting
HighDeploy network monitoring for dev environments
HighConduct forensic analysis of affected systems
MediumEstablish extension security review process

For the industry

PriorityAction
HighImprove marketplace security scanning
HighRequire publisher verification
MediumImplement extension permission transparency
MediumEnable network activity visibility

Context

This incident represents a sophisticated supply chain attack targeting the developer community at scale. By embedding data theft within genuinely useful AI coding assistants, the attackers achieved 1.5 million installations before detection.

The use of multiple Chinese analytics platforms and the “ChatMoss Data Tracking” interface suggests organized, deliberate data collection rather than opportunistic theft. The three-channel exfiltration architecture indicates significant development investment in avoiding detection.

For affected organizations, forensic investigation will require months to determine what proprietary code and credentials were exposed. The 1.5 million installation count means thousands of organizations across enterprise, startup, and open-source environments may have had sensitive data exfiltrated.

The broader trend is concerning: malicious VS Code extension detections increased nearly 4x from 2024 to 2025. As AI coding assistants become ubiquitous, they present an attractive attack vector—developers grant these tools deep access to their codebases, creating significant exposure if the tools are compromised.

Microsoft has intensified marketplace enforcement, but the fundamental challenge remains: useful functionality can mask malicious behavior, and developers tend to trust tools that improve their productivity. Defense requires both platform-level controls and developer awareness of supply chain risks.