IDE Extensions - T1176.002 (66b34be7-6915-4b83-8d5a-b0f0592b5e41)
Adversaries may abuse an integrated development environment (IDE) extension to establish persistent access to victim systems.(Citation: Mnemonic misuse visual studio) IDEs such as Visual Studio Code, IntelliJ IDEA, and Eclipse support extensions - software components that add features like code linting, auto-completion, task automation, or integration with tools like Git and Docker. A malicious extension can be installed through an extension marketplace (i.e., Compromise Software Dependencies and Development Tools) or side-loaded directly into the IDE.(Citation: Abramovsky VSCode Security)(Citation: Lakshmanan Visual Studio Marketplace)
In addition to installing malicious extensions, adversaries may also leverage benign ones. For example, adversaries may establish persistent SSH tunnels via the use of the VSCode Remote SSH extension (i.e., IDE Tunneling).
Trust is typically established through the installation process; once installed, the malicious extension is run every time that the IDE is launched. The extension can then be used to execute arbitrary code, establish a backdoor, mine cryptocurrency, or exfiltrate data.(Citation: ExtensionTotal VSCode Extensions 2025)
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Software Extensions - T1176 (389735f1-f21c-4208-b8f0-f8031e7169b8) | Attack Pattern | IDE Extensions - T1176.002 (66b34be7-6915-4b83-8d5a-b0f0592b5e41) | Attack Pattern | 1 |