Webinar | Tuesday, July 29 @ 11am-12pm ET

Unmasking a VS Code Supply Chain Attack

Mask group-1

Explore one of the most compelling recent software supply chain attacks targeting the popular VS Code platform. This webinar will dissect the compromise of ETHcode, a trusted Visual Studio Code extension for Ethereum smart contract development with nearly 6,000 installs.

Hijacked through a GitHub pull request introducing just two lines of malicious code, ETHcode demonstrates how minimal changes can have devastating impacts.

ReversingLabs experts will unpack how automated detection flagged these suspicious changes — missed by human reviewers — and reveal lessons for defending against similar threats.

Learn how modern development workflows, reliant on community-driven extensions and auto-updating ecosystems, are becoming high-value targets—and what proactive strategies can help protect your organization.

Among other things, the webinar will explore:

  • How the attacker used a fake GitHub account to deliver the payload.

  • Why the malicious changes escaped the notice of human code reviewers.

  • What the obfuscated “keythereum-utils” dependency did, and how it nearly went unnoticed.

  • Best practices for detecting and mitigating similar threats in your CI/CD pipeline.

Who should attend:
Developers, security engineers, and project maintainers who rely on open source ecosystems. You’ll learn how minimal changes can introduce maximum risk — and which proactive strategies can keep your organization safe.

Register now. *Live attendees will receive an attendance certificate to be used towards CPE credits. 

Watch Now

Meet the Speakers