Quick Facts
- Category: Software Tools
- Published: 2026-05-19 13:18:45
- AI-Driven Vulnerability Discovery: How Enterprises Can Adapt to a Faster Threat Landscape
- cPanel's Post-Attack Response: Critical Patches Issued After Ransomware Hits 44,000 Servers
- 6 Key Updates in Windows 11 Insider Previews You Should Know About
- Mastering Markdown on GitHub: A Beginner's Step-by-Step Guide
- Apple Bolsters macOS Defenses Against Social Engineering: Terminal Paste Warnings
Overview
In a startling incident that underscores the risks of software supply chain attacks, cybersecurity researchers recently discovered a compromised version of a popular VS Code extension. The extension, known as rwl.angular-console (version 18.95.0), was maliciously published to the Microsoft Visual Studio Code Marketplace. This malicious update targeted developers using code editors like VS Code, Cursor, and JetBrains, aiming to steal credentials from unsuspecting users. With over 2.2 million installations of the legitimate extension, the potential impact was enormous. This tutorial will guide you through understanding the threat, identifying if you were affected, and taking concrete steps to protect your development environment from similar attacks.

Prerequisites
Before diving into the step-by-step instructions, ensure you have the following:
- Basic familiarity with Visual Studio Code and its extension management.
- Access to a terminal or command prompt (optional but helpful for scanning).
- A clear understanding of security best practices (e.g., not reusing passwords, using MFA).
Step-by-Step Instructions
Step 1: Identify if You Installed the Compromised Version
The malicious extension is specifically rwl.angular-console version 18.95.0. The publisher name is rwl. To check your VS Code extensions:
- Open VS Code.
- Click the Extensions icon in the sidebar (or press Ctrl+Shift+X).
- Search for 'angular-console' or browse the list of installed extensions.
- Look for an extension with the publisher rwl and the exact version 18.95.0.
- If found, proceed to Step 2 immediately.
Note: The official Nx Console extension is published by nrwl (Nrwl.angular-console). The compromised version uses a similar name but with a different publisher. Always verify the publisher field.
Step 2: Remove the Malicious Extension
If you identified the compromised extension, you must uninstall it promptly:
- Click the gear icon next to the extension entry and select Uninstall.
- Alternatively, right-click the extension and choose Uninstall.
- After removal, restart VS Code to ensure no lingering processes remain.
Do not simply disable the extension—uninstall it completely. Disabling may still leave hooks or background scripts active.
Step 3: Scan Your System for Signs of Compromise
Credential-stealing malware often exfiltrates stored tokens, passwords, or API keys. Run the following checks:
- Check for unusual processes: Use Task Manager (Windows) or Activity Monitor (macOS) to look for unknown processes consuming network activity.
- Scan for malware: Use a trusted antivirus or anti-malware tool (e.g., Windows Defender, Malwarebytes) to perform a full system scan.
- Review network logs: If you have network monitoring tools, check for outgoing connections to unrecognized IP addresses, especially those associated with known threat actors.
- Inspect environment variables: On Linux/macOS, run
envin the terminal and look for any suspicious entries that may have been injected.
Step 4: Reset Compromised Credentials
Assume any credentials stored on your system could be compromised, especially those used with VS Code (e.g., GitHub tokens, SSH keys, cloud provider secrets).
- Rotate all API keys and tokens: Revoke existing tokens in your GitHub, GitLab, AWS, Azure, or other developer accounts and generate new ones.
- Change passwords: Update passwords for any accounts that may have been accessed via these tokens.
- Enable multi-factor authentication (MFA) on all critical accounts if not already in place.
Step 5: Verify Extension Source Integrity Going Forward
To prevent future incidents, adopt a rigorous approach to extension verification:

- Check the publisher ID: The official Nx Console publisher is nrwl, not rwl. Always cross-reference with the official project website or documentation.
- Examine version history: Legitimate extensions usually have a long history of updates. A sudden jump in version numbers may be a red flag.
- Read the extension's permissions: In VS Code, go to the extension details and review the Extension Pack or Contributions tab to see what it requests access to.
- Use the built-in VS Code security features: Enable the "Extensions: Marketplace" trust settings in VS Code settings. You can set it to only allow installations from the official marketplace.
Step 6: Monitor for Similar Threats
Stay informed about compromised extensions by:
- Subscribing to security advisories from the VS Code team and cybersecurity firms.
- Using tools like Extension Manager or VS Code Extension Security Scanner (available as community tools) to audit installed extensions.
- Regularly reviewing your installed extensions and removing any you no longer use.
Common Mistakes to Avoid
- Assuming all official-looking extensions are safe: Attackers can mimic publisher names (e.g., using 'rwl' instead of 'nrwl'). Always double-check.
- Ignoring version numbers: The compromised version 18.95.0 was a single rogue release. If you had automatic updates enabled, you might have installed it without noticing.
- Not scanning after a suspected compromise: Many users only remove the extension but forget to check for leftover malware or keyloggers. A full scan is essential.
- Reusing passwords across tools: If your VS Code token is stolen, attackers may use it to access multiple services. Use unique tokens and passwords for each service.
Summary
The Nx Console 18.95.0 incident serves as a stark reminder that even widely used developer tools can be weaponized. By understanding the threat, checking for the compromised version, removing it, scanning your system, and resetting credentials, you can mitigate the damage. Going forward, adopt a zero-trust mindset for all extensions: verify publishers, review permissions, and stay alert to security announcements. Remember, the safest extension is one that you know and trust—never install blindly.