GitHub has confirmed that a device of an employee engaged by a malicious extension of Visual Studio Code allowed the exfiltration of hundreds or thousands of internal repositories; the figure that circulates - around 3,800 internal repositories- coincides "directionally" with the internal evaluation that the company has done so far. GitHub says it removed the poisoned version of the extension of the Marketplace, isolated the affected endpoint and initiated the response to incidents, and at the moment has found no evidence that client data outside of those internal repositories have been compromised ( GitHub's statement).
In parallel, an actor who identifies as TeamPCP has published alleged samples of the loot and has tried to negotiate the sale of data in criminal forums, a tactic we have already seen with attacks on the software supply chain. This episode shows again two simultaneous realities: the development tools are now a high impact attack vector and the attackers continue to exploit the confidence that the teams put in third-party extensions and supplements.

VS Code extensions are very useful for developers but also dangerous if they are threaded: in recent years multiple cases of plugins have appeared with millions of downloads that stole credentials, filtered local files or deployed malware as cryptomineros. That a single malicious extension can open the way to exfiltration of internal repositories confirms that the attack surface is not just the code itself, but the tools that you work with. To understand how the ecosystem works and the precautions to be taken, Microsoft maintains official documentation of the Marketing and Extensions in VS Code ( VS Code Market documentation).
What practical consequences does this have for companies and developers? In the short term, any organization with direct integrations or dependencies of the affected repositories must take risk: proprietary code, deployment scripts, embedded tokens or internal documentation could have been compromised. Although GitHub still does not publicly attribute the intrusion or confirm the full scope, prudence forces this incident to be treated as a serious security gap and to take immediate action.
Operational recommendations that should already be implemented: verify and rotate credentials and tokens with access to internal repositories and related systems; audit GitHub records and network logs to identify clones, atypical access or mass transfers; force the regeneration of personal and service keys when there is doubt; and keep the endpoints affected with EDR solutions or forensic analysis isolated and analysed. GitHub offers tools and documentation for tokens management, audit records and secret scanning that should be incorporated into these processes ( tokens management in GitHub).

In the medium and long term, organizations should increase control over the development environment: implement extension installation policies (allowlist / denylist) or prohibit local facilities in machines that have access to critical repositories; move development environments to isolated containers or desks; apply the principle of minor privilege in tokens and repository permits; and automate the scanning of secrets in commits and artifacts. In addition, it is essential to integrate IDE and endpoint telemetry with internal detection systems to detect strange behaviors of extensions and processes.
For individual developers, the practical recommendation is extreme caution: install only extensions of editors that are well maintained by verified authors, review the source code of the extension if possible, check which permissions you request and prefer uses in isolated environments when working with sensitive repositories. The community and suppliers must demand greater security in the Market: extension signatures, stricter automated validation and transparency on the units and telemetry of the plugins.
This incident recalls that the security of modern software includes the security of the tools that produce it. Companies, platform providers and developers have different but complementary roles: platforms must tighten the review and distribution of extensions, and organizations must assume that the developer's job is a critical asset that requires controls as rigorous as those applied to production infrastructures. For those who want to deepen on how to mitigate risks in the software supply chain, it is appropriate to read specialized resources and community guides on supply chain hardening (e.g. public projects and recommendations in OWASP and supplier security documentation). OWASP - Supply Chain Attacks.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...