Ethereum Dev Zak.eth Hit by Malicious VS Code Extension Hack

How a Fake VS Code Extension Stole from an Ethereum Developer and Sparked a Wake-Up Call for Builder Security

Written By:
Kenrodgers Fabian

Reviewed By:
Jahnu Jagtap

Ethereum Dev Zak.eth Hit By Malicious Vs Code Extension Hack

A decade of flawless security ended for Ethereum core developer Zak.eth after a malicious VS Code extension on ai code editor Cursor drained his wallet. The incident, which occurred last week, involved the “contractshark.solidity-lang” extension. 

According to Zak.eth X thread, the extension appeared legitimate with over 54,000 downloads, a professional description, and presence in Cursor’s default registry. However, within minutes of installation, the extension accessed Zak’s .env file and transmitted his private key to an attacker’s server. Three days later, the attacker drained funds.

Zak lost only a few hundred dollars thanks to strict operational security. His main funds remained on hardware wallets. “If it can happen to me, it can happen to you,” he warned, noting he had never been hacked before. The attack is part of a larger $500,000+ theft campaign targeting developers through supply chain vulnerabilities.

How the Attack Unfolded

The extension exploited misspelt names, huge download counts, and confidence in official registries. By using only JavaScript, it was able to evade OS-level malware detection.

It primarily targeted developers who were rushing to release their work at the most vulnerable times. Zak acknowledged that he overlooked some warning signs, like the absence of a linked GitHub repository and the odd naming of the publisher.

In addition to losing money, he stumbled upon malicious tools used by the attacker, including “juanbIanco.solidity” and the “solsafe” npm package. He advised developers to conduct an immediate audit of their installed extensions, change their keys, and ensure that no sensitive information is left in their .env files.

Strengthening Developer Defenses

Following the breach, Zak redesigned his workflow. The developer uses isolated virtual machines, hardware wallets exclusively, and encrypted vaults for secrets. Also, he applies an extension whitelist and avoids installing new tools in haste.

Security experts echo his advice. Hakan Unal from Cyvers stressed, “Builders should vet extensions, avoid storing secrets in plain text or .env file, use hardware wallets, and develop in isolated environments.”

This breach shows that even the most security-conscious developers remain vulnerable to modern supply chain attacks. Consequently, developer trust in extension marketplaces is a side to be re-evaluated. As Zak concluded, “Good OpSec saved me from disaster. Paranoia paid off.”

Also Read: US, Allies Dismantle BlackSuit, Grab $1M in Crypto Assets


Mobile Only Image

Share This Article
Follow:
Kenrodgers Fabian is a Content Writer with over 3 years of experience in crypto news, data analysis, and IT. With a degree in Health Records and Information Technology, he brings a structured and analytical approach to digital reporting. Kenrodgers focuses on delivering accurate, informative content that helps readers stay updated on the latest trends in crypto and emerging technologies.
Follow:

Jahnu Jagtap is a Research Analyst with over 5 years of experience in crypto, finance, fintech, blockchain, Web3, and AI. He holds a BSc in Mathematics and is certified in Blockchain and Its Applications (SWAYAM MHRD), Cryptocurrency (Upskillist), and NISM Certifications. Jahnu specializes in technical, on-chain, and fundamental analysis, while also closely tracking global macro trends, regulations, lawsuits, and U.S. equities. With a strong analytical background and editorial insight, he drives content that delivers clarity and depth in the fast-evolving world of digital finance.