Microsoft Teams macOS Bug Traps Users in Location Permission Loop

Written by AI Press Team on 2026-05-19 10:30:00.

Microsoft Teams macOS Bug Traps Users in Location Permission Loop

Microsoft has acknowledged a frustrating bug affecting Teams users on macOS that displays persistent location permission prompts that cannot be dismissed, leaving enterprise users unable to access the collaboration platform's interface.

According to BleepingComputer, the issue stems from a conflict between Microsoft Teams and recent macOS system updates that has disrupted the operating system's permissions framework. The software giant confirmed that the non-dismissible pop-ups are not a Teams-specific defect but rather emerge from compatibility issues triggered by Apple's latest system changes.

What's happening

Affected users report being caught in an endless loop of location permission requests when launching or using Teams on their Mac systems. The prompts appear repeatedly and cannot be granted or denied, effectively blocking access to the Teams interface and disrupting workflow for remote workers who depend on the platform for daily communication.

The problem has gained traction in enterprise environments where Teams serves as a critical communication hub. IT administrators have documented cases where employees are unable to join meetings, access chat histories, or collaborate on shared documents due to the persistent dialog boxes that dominate the screen.

Microsoft's response

Microsoft has identified the root cause as a conflict between Teams and macOS's updated permissions handling system. The company indicated that the issue emerged following recent Apple system updates that modified how location services interact with enterprise applications.

While Microsoft has not provided a specific timeline for a permanent fix, the company has acknowledged the severity of the disruption and is working with Apple to resolve the underlying compatibility issue. The lack of a concrete patch date has frustrated IT departments managing large Teams deployments across macOS fleets.

Temporary workarounds

In the absence of an official patch, Microsoft and community forums have identified several temporary measures that may provide relief:

Update Teams immediately — Administrators should ensure all macOS devices are running the latest version of Microsoft Teams, as newer releases may include partial mitigations.

System restarts — Users experiencing persistent prompts can temporarily clear the dialog loop by restarting their macOS systems. However, this workaround provides only temporary relief, as the prompts typically return after Teams relaunches.

Monitor official channels — IT teams should track Microsoft's support pages and official communications for updates on patch availability.

Broader implications for enterprise IT

This incident highlights growing tensions between enterprise application developers and consumer operating system privacy controls. As macOS and Windows continue tightening default privacy settings, enterprise software vendors face increasing challenges maintaining compatibility across diverse deployment environments.

The Teams bug underscores the importance of rigorous cross-platform testing before deploying system updates in enterprise environments. IT administrators may need to implement more deliberate update validation processes, particularly for mission-critical applications like collaboration platforms.

Security professionals note that while the location permission prompts are disruptive, they do not represent a security vulnerability. However, the incident demonstrates how privacy features designed to protect users can inadvertently create productivity barriers when implementation details conflict between software layers.

What IT administrators should do now

Organizations affected by the issue should prioritize the following actions:

  1. Audit Teams deployments across macOS devices to identify affected users
  2. Deploy the latest Teams updates to all endpoints
  3. Document workaround procedures for help desk staff
  4. Establish monitoring for Microsoft patch announcements
  5. Consider temporary platform alternatives for critically affected users

Microsoft has not specified which macOS versions or Teams releases are affected beyond acknowledging that the issue impacts "some systems." Organizations running mixed macOS environments should prepare for potentially uneven impact across their device fleets.

The company is expected to release additional guidance as a patch development timeline becomes clearer.


This article was reported by the AI Press Team based on information from BleepingComputer and Microsoft's public statements.


Microsoft Teams macOS Bug 令用戶陷入位置權限死循環

Microsoft 已經確認咗一個令 Teams 用戶好嬲嘅 Bug,喺 macOS 上面會不斷彈出位置權限要求,而且唔可以關閉,搞到企業用戶根本進唔到協作平台嘅介面。

據 BleepingComputer 報道,呢個問題係 Microsoft Teams 同最近嘅 macOS 系統更新之間發生衝突,搞亂咗作業系統嘅權限架構。軟件巨頭確認咗,呢啲關唔到嘅彈窗並唔係 Teams 獨有嘅缺陷,而係 Apple 最近改咗系統設定後引發嘅相容性問題。

究竟發生咗咩事

受影響嘅用戶話,佢哋喺 Mac 上面開 Teams 或者用嘅時候,會陷入位置權限要求嘅無限死循環。彈窗會不斷出現,而且唔可以批准或者拒絕,等於直接封死咗 Teams 介面,搞到依賴呢個平台做日常溝通嘅遠距工作者完全冇法正常運作。

呢個問題喺企業環境入面特別嚴重,因為 Teams 係佢哋溝通嘅核心樞紐。IT 管理員已經記錄咗好多案例,員工因為成個螢幕畀彈窗霸佔,根本入唔到會議、睇唔到對話紀錄,或者冇法一齊協作處理共享文件。

Microsoft 嘅回應

Microsoft 已經搵到根因,係 Teams 同 macOS 更新後嘅權限處理系統發生衝突。公司指出,呢個問題係 Apple 最近更新系統、改咗位置服務同企業應用程式互動方式之後先出現嘅。

雖然 Microsoft 仲未畀出永久修復嘅具體時間表,但公司已經承認呢個干擾好嚴重,而家正同 Apple 一齊解決底層嘅相容性問題。因為冇明確嘅補丁發佈日期,令到管理成批 macOS 裝置同 Teams 部署嘅 IT 部門都好頭大。

臨時應對方法

喺官方補丁出嚟之前,Microsoft 同社區論壇已經搵到幾招臨時措施,可以幫手紓緩一下:

即刻更新 Teams — 管理員應該確保所有 macOS 裝置都裝緊最新嘅 Microsoft Teams 版本,因為新版本可能已經包含部分修復。

重新啟動系統 — 遇到彈窗不斷出現嘅用戶,可以試下重新開機嚟暫時清除呢個死循環。不過呢招只係權宜之計,因為 Teams 一開返,彈窗通常又會返嚟。

留意官方渠道 — IT 團隊應該密切留意 Microsoft 嘅支援網頁同官方公告,跟進補丁有冇出嚟。

對企業 IT 嘅深遠影響

呢件事反映咗企業應用程式開發者同消費級作業系統嘅隱私控制之間嘅矛盾越嚟越深。隨住 macOS 同 Windows 繼續收緊預設嘅隱私設定,企業軟件供應商要喺唔同嘅部署環境入面維持相容性,難度越嚟越高。

Teams 呢個 Bug 再次證明咗喺企業環境部署系統更新之前,做足跨平台測試有多重要。IT 管理員可能需要搞多啲嚴謹嘅更新驗證流程,特別係對協作平台呢類核心應用。

保安專家指出,雖然位置權限彈窗好煩,但並唔係保安漏洞。不過呢件事亦都顯示出,原本為咗保護用戶而設計嘅隱私功能,如果唔同軟件層之間嘅實作細節有衝突,反而會無意中搞到用戶冇法高效工作。

IT 管理員而家應該點做

受影響嘅機構應該優先跟進以下事項:

  1. 檢查所有 macOS 裝置上嘅 Teams 部署情況,搵出受影響嘅用戶
  2. 將最新嘅 Teams 更新推送到所有終端機
  3. 將應對方法寫成指引,畀 Help Desk 員工跟隨
  4. 設立機制監察 Microsoft 嘅補丁公告
  5. 為受嚴重影響嘅用戶考慮臨時嘅替代平台

Microsoft 除咗承認問題影響「部分系統」之外,仲未具體說明係邊個 macOS 版本或者 Teams 版本出問題。運行混合 macOS 環境嘅機構應該預先準備好,因為影響可能會喺唔同裝置之間參差。

跟住補丁開發時間表越嚟越清晰,公司預計會發出新嘅指引。


本文由 AI Press Team 根據 BleepingComputer 嘅報道同 Microsoft 嘅公開聲明整理。

原文連結 / Original Article


Firefox 151.0 Delivers Session Management Upgrades and Enhanced Location Privacy

Written by AI Press Team on 2026-05-19 10:00:00.

Mozilla has released Firefox 151.0, introducing privacy enhancements and usability improvements to its browser platform. The update brings native private browsing session management, strengthened fingerprinting defenses, and granular location controls for VPN users.

Private Browsing Session Reset

Firefox 151.0 introduces the ability to clear and restart private browsing sessions without closing the entire window, according to Mozilla's release notes. This functionality addresses a usability gap that privacy-conscious users and security researchers have highlighted for years.

Previously, users seeking to purge browsing data mid-session needed to close all private windows and reopen them. The new implementation allows users to reset their private browsing state while maintaining their workflow, particularly valuable for shared computers or situations where multiple users access the same browser instance.

Enhanced Fingerprinting Protection

The release strengthens Firefox's defenses against fingerprinting techniques that track users across websites by collecting device and browser configuration data. The enhanced protection builds upon Firefox's existing anti-fingerprinting measures.

Fingerprinting protection has become a key differentiator between Firefox and Chromium-based browsers. While many competitors focus primarily on cookie management, Mozilla's approach targets the underlying mechanisms that enable cross-site identification without relying on traditional tracking cookies.

For enterprise deployments, these improvements align with GDPR and CCPA compliance requirements, reducing the burden on organizations to implement additional privacy controls through extensions or external tools.

VPN Location Controls

Firefox 151.0 introduces granular control over apparent location when using Firefox VPN. Users can now select specific geographic locations for their VPN connections, a feature valuable for both compliance scenarios and developer workflows.

Enterprise users benefit from the ability to test geo-restricted content or verify location-based service behavior without requiring third-party VPN solutions. Developers gain a native tool for testing internationalization and region-specific functionality directly within the browser.

Availability

Firefox 151.0 is available now for Windows, macOS, and Linux platforms. Existing users will receive the update through automatic update channels. The release notes are available on Mozilla's website.

Source: LWN.net


Mozilla 而家已經推出 Firefox 151.0,為佢個瀏覽器平台帶嚟一連串嘅隱私保護升級同埋使用體驗改善。呢個更新帶嚟咗原生嘅私人瀏覽會話管理、加強嘅指紋識別防禦,同埋畀 VPN 用戶用嘅精細位置控制功能。

私人瀏覽會話重置

根據 Mozilla 嘅更新說明,Firefox 151.0 新增咗一個功能,可以喺唔關掉成個視窗嘅情況下,直接清除並重新開始私人瀏覽會話。呢個功能解決咗一個長期以來被注重隱私嘅用戶同保安研究員指出嘅使用體驗空白。

以往,如果用戶想喺瀏覽中途清除數據,就必須關掉所有私人視窗再重新開返。而家嘅新設計允許用戶喺唔打斷原有工作流程嘅情況下重置私人瀏覽狀態,對於共用電腦或者需要多人同時用同一個瀏覽器實例嘅情況尤其有用。

加強指紋識別防護

呢個版本加強咗 Firefox 對指紋識別技術嘅防禦,呢啲技術通常會透過收集裝置同瀏覽器配置數據嚟追蹤用戶喺唔同網站嘅活動。呢項加強防護係基於 Firefox 現有嘅反指紋識別措施進一步發展而成。

而家指紋識別防護已經成為 Firefox 同 Chromium 系瀏覽器之間嘅一個重要分別。雖然好多競爭對手主要集中喺 Cookie 管理,但 Mozilla 嘅做法係直接針對背後嘅跨網站識別機制,而且唔會依賴傳統嘅追蹤 Cookie。

對於企業部署嚟講,呢啲改進符合 GDPR 同 CCPA 嘅合規要求,令企業唔使再為咗實施額外隱私控制而依賴擴充功能或者外部工具,減輕咗好多負擔。

VPN 位置控制

Firefox 151.0 帶嚟咗使用 Firefox VPN 時對虛擬位置嘅精細控制。用戶而家可以為 VPN 連線選擇特定嘅地理位置,呢個功能對合規需求同開發者工作流程都好有用。

企業用戶可以藉此測試受地域限制嘅內容,或者驗證基於位置嘅服務運作,完全唔使再依賴第三方 VPN 方案。開發者則可以喺瀏覽器內直接用呢個原生工具,測試國際化同地區特定功能。

版本可用性

Firefox 151.0 而家已經可以喺 Windows、macOS 同 Linux 平台下載使用。現有用戶會透過自動更新頻道收到呢個更新。更新說明可以喺 Mozilla 官方網站搵到。

來源:LWN.net

原文連結 / Original Article


openSUSE Revises Age Restrictions After Community Pushback

Written by AI Press Team on 2026-05-19 10:30:00.

The openSUSE project has modified its website terms of service following swift community criticism over age restrictions that would have barred contributors under 16 from participating. The incident highlights ongoing tensions between regulatory compliance and the open-source community's tradition of age-blind meritocracy.

The Policy Change and Backlash

According to LWN.net, openSUSE recently updated its terms of site to require users to be "at least 16 years of age or the age of majority" in their jurisdiction. The change quickly drew objections from Linux community members who noted that many prominent contributors began their open-source journeys well before reaching 16.

The restriction appeared to stem from data protection compliance concerns, particularly around GDPR requirements for processing minors' personal data. However, the blanket minimum age effectively excluded a demographic that has historically contributed significantly to Linux and open-source projects.

Quick Reversal Demonstrates Responsive Governance

Following the community feedback, openSUSE modified the terms. While specific details of the revised policy have not been fully documented, the project appears to be moving toward a parental consent model rather than outright age-based exclusion.

The swift reversal demonstrates the importance of transparent, responsive governance in open-source projects. Had the project maintained the original restrictions without consultation, it risked alienating community members and setting a precedent that other projects might follow.

Why This Matters for Open Source

The openSUSE incident touches on a fundamental question facing mature open-source projects: how to balance legal compliance with community values. Open source has traditionally operated as an age-blind meritocracy where contributions are evaluated on their technical merit rather than the contributor's demographics.

Many well-known Linux developers began contributing as teenagers. Blanket age restrictions would exclude this vital contributor pool and potentially discourage young developers from entering the open-source ecosystem.

At the same time, projects operating in the EU and other jurisdictions with strict data protection laws must comply with regulations governing minors' data. The challenge lies in implementing compliance measures that don't erect unnecessary barriers to participation.

The Path Forward: Parental Consent Models

Industry observers suggest that a parental consent framework offers a practical middle ground. Under this approach, contributors under a certain age could participate with explicit guardian permission, allowing projects to meet legal obligations while maintaining inclusivity.

However, this approach raises its own questions. Projects would need to establish processes for verifying parental consent without creating administrative burdens that discourage participation. They must also determine which specific data collection practices trigger age restrictions under various jurisdictions' laws.

Broader Implications

The openSUSE situation may serve as a case study for other open-source projects navigating similar compliance challenges. As regulatory scrutiny of online platforms increases, more projects will face questions about how to handle minors' participation.

The key lesson from openSUSE's experience is that community consultation should precede policy changes that affect contributor eligibility. Projects that engage their communities early in the compliance process are more likely to find solutions that satisfy both legal requirements and community values.

For now, the openSUSE project has demonstrated that responsive governance can resolve tensions between regulatory compliance and open-source inclusivity. The broader community will be watching to see how the revised terms are implemented and whether other projects adopt similar approaches.


openSUSE 專案喺社群迅速反彈之後,修改咗網站嘅服務條款。原本嘅年齡限制會禁止 16 歲以下嘅貢獻者參與,引發咗大家唔滿。呢件事反映咗監管合規同開源社群一貫堅持嘅「唔問年齡、唯才是舉」傳統之間嘅持續張力。

政策變動同社群反彈

據 LWN.net 報道,openSUSE 最近更新咗 網站條款,要求用戶必須「年滿 16 歲或達到當地法定成年年齡」。呢個改動好快就惹嚟 Linux 社群成員嘅反對,大家指出好多知名貢獻者喺開源世界起步嘅時候,根本未夠 16 歲。

呢項限制似乎係出於資料保護合規嘅顧慮,特別係 GDPR 對處理未成年人個人資料嘅要求。不過,一刀切嘅最低年齡限制,無形中將一群歷史上對 Linux 同開源專案貢獻巨大嘅人拒之門外。

迅速撤回反映靈活管治

收到社群反饋之後,openSUSE 跟住修改咗條款。雖然具體嘅修訂細節仲未完全公開,但專案似乎正轉向「家長同意」模式,而唔係直接按年齡一刀切。

呢個迅速嘅改口,正正顯示咗開源專案需要透明同迅速回應嘅管治機制。如果專案堅持原來的限制而唔同大家商討,就好易令社群成員心寒,甚至開咗個壞頭,令其他專案跟風。

點解呢件事對開源咁重要

openSUSE 呢件事觸及咗成熟開源專案面對嘅核心問題:點樣喺法律合規同社群價值觀之間取得平衡?開源世界一向係「唔問年齡、唯才是舉」嘅 meritocracy,貢獻係按技術水準去評估,而唔係睇貢獻者嘅背景。

好多知名嘅 Linux 開發者都係由青少年時期開始貢獻。一刀切嘅年齡限制會將呢群重要嘅貢獻者排除在外,亦可能令年輕開發者對進入開源生態失去興趣。

另一方面,喺歐盟同其他有嚴格資料保護法例嘅地區運作嘅專案,都必須遵守關於未成年人資料嘅法例。真正嘅難處係點樣落實合規措施,而唔係設立不必要嘅參與門檻。

未來方向:家長同意模式

業界觀察人士認為,家長同意框架係一個實用嘅折衷方案。按呢個做法,未達特定年齡嘅貢獻者可以喺取得監護人明確同意下參與,咁樣專案就可以同時兼顧法律責任同包容性。

不過,呢個做法亦帶嚟新問題。專案需要建立機制去核實家長同意,但又唔好搞到行政程序太繁複,嚇走參與者。同時,佢哋亦要釐清喺不同地區法例下,邊種具體嘅資料收集行為會觸發年齡限制。

更廣泛嘅影響

openSUSE 嘅情況可以成為其他開源專案嘅借鏡,特別係面對類似合規挑戰嘅時候。隨著監管機構對網際平台嘅審查越來越嚴,更多專案都要面對點樣處理未成年人參與嘅問題。

openSUSE 嘅經驗帶嚟最重要嘅啟示係:影響貢獻者資格嘅政策變動,應該先同社群商討。喺合規過程中早點拉埋社群一齊參與嘅專案,先至更有可能搵到兼顧法律要求同社群價值嘅解決方案。

而家,openSUSE 已經證明咗靈活嘅管治可以化解監管合規同開源包容性之間嘅矛盾。整個開源社群都會密切留意呢份修訂條款點樣落實,亦會睇吓其他專案會唔會跟進類似做法。

原文連結 / Original Article


OpenBSD 7.9 Raises CPU Core Limit to 255, Adds WiFi 6 Support

Written by AI Press Team on 2026-05-19 11:03:00.

The OpenBSD project has announced the release of OpenBSD 7.9, marking another significant milestone for the security-focused BSD operating system. Version 7.9 introduces substantial hardware support improvements, including expanded CPU core scalability and initial WiFi 6 compatibility.

Maximum CPU Core Support Expanded to 255

One of the headline features in OpenBSD 7.9 is the substantial increase in maximum CPU core support for AMD64 (x86_64) systems. The operating system now supports up to 255 CPU cores, a significant jump from the previous limit of 64 cores. This change brings OpenBSD closer to parity with other modern operating systems as high-core-count processors become increasingly common in both workstation and server environments.

According to project lead Theo de Raadt, the 255-core ceiling stems from xAPIC architectural requirements. While contemporary dual-socket Intel Xeon and AMD EPYC processors can exceed this core count, OpenBSD must work within these constraints until x2APIC support reaches production readiness. The development team continues to work on improved x2APIC implementation for future releases.

Initial WiFi 6 Support

OpenBSD 7.9 introduces initial support for 802.11ax wireless networking, commonly known as WiFi 6. This addition represents a meaningful step forward for the platform's wireless capabilities, enabling compatibility with modern wireless networking hardware. The implementation integrates with OpenBSD's existing wireless stack, maintaining the project's commitment to security and code quality even as it expands hardware support.

The WiFi 6 support in this release provides users with access to improved wireless throughput and efficiency compared to previous generations, though the initial implementation focuses on establishing a stable foundation rather than exhaustive hardware compatibility.

Additional Hardware and Driver Improvements

Beyond the headline features, OpenBSD 7.9 includes numerous hardware driver enhancements and system improvements. The AMDGPU graphics driver receives important fixes, improving stability and compatibility for systems with AMD graphics hardware. The release also addresses floating-point state leakage vulnerabilities affecting AMD Zen 1 processors, reinforcing OpenBSD's security-first approach.

Network connectivity receives attention with the Intel ICE Ethernet driver now enabled on ARM64 platforms, expanding hardware options for users deploying OpenBSD on ARM-based systems. The release also incorporates scheduler improvements that enhance overall system responsiveness and performance under varied workload conditions.

Delayed Hibernation Support

Version 7.9 introduces support for delayed hibernation, providing users with greater flexibility in power management. This feature allows systems to schedule hibernation events, enabling more sophisticated power management strategies for both desktop and server deployments.

Availability and Documentation

OpenBSD 7.9 is available now for download from the project's official website. The release includes comprehensive documentation detailing the full range of changes, security improvements, and hardware compatibility updates. As with all OpenBSD releases, version 7.9 emphasizes code correctness, security, and stability over feature proliferation, maintaining the project's distinctive philosophy in the BSD ecosystem.

The release continues OpenBSD's tradition of regular six-month release cycles, providing users with predictable update schedules and consistent access to security improvements and hardware support enhancements.


OpenBSD 團隊宣佈推出 OpenBSD 7.9,標誌住呢個以安全為本嘅 BSD 作業系統再創重要里程碑。7.9 版本帶嚟硬件支援嘅重大升級,包括擴展 CPU 核心支援同初步支援 WiFi 6。

最大 CPU 核心支援擴展至 255

OpenBSD 7.9 其中一個重點功能,就係大幅擴大 AMD64 (x86_64) 系統嘅最大 CPU 核心支援。而家個作業系統最多可以支援 255 個 CPU 核心,比起之前嘅 64 個核心上限有顯著提升。隨住高核心數處理器喺工作站同伺服器環境越來越普及,呢個改動令 OpenBSD 更接近其他現代作業系統嘅水平。

根據項目負責人 Theo de Raadt 嘅解釋,255 個核心嘅上限係源於 xAPIC 嘅架構要求。雖然而家嘅雙插槽 Intel Xeon 同 AMD EPYC 處理器可以超過呢個核心數,但喺 x2APIC 支援達到生產環境可用之前,OpenBSD 必須喺呢個限制下運作。開發團隊正繼續努力改善 x2APIC 嘅實作,預計會喺未來版本推出。

初步支援 WiFi 6

OpenBSD 7.9 首度引入對 802.11ax 無線網絡嘅支援,也就是大家熟悉嘅 WiFi 6。呢個升級對平台嘅無線能力嚟講係重要一步,令到可以相容現代無線網絡硬件。實作方面會整合入 OpenBSD 現有嘅無線網絡堆疊,即使擴展硬件支援,都維持項目對安全同程式碼質素嘅堅持。

呢個版本嘅 WiFi 6 支援令用戶可以享受到比起前代更好嘅無線吞吐量同效率,不過初步實作主要係建立穩定基礎,而唔係追求全面嘅硬件相容性。

其他硬件同驅動程式改進

除咗上述重點功能,OpenBSD 7.9 仲包含大量硬件驅動程式增強同系統改進。AMDGPU 顯示卡驅動程式收到重要修復,改善咗使用 AMD 顯示卡系統嘅穩定性同相容性。版本亦處理咗影響 AMD Zen 1 處理器嘅浮點狀態洩漏漏洞,進一步鞏固 OpenBSD 安全優先嘅理念。

網絡連接方面,Intel ICE 以太網驅動程式而家已經喺 ARM64 平台啟用,擴展咗喺 ARM 系統部署 OpenBSD 嘅硬件選擇。版本仲加入排程器改進,喺不同工作負載情況下提升整體系統嘅回應速度同效能。

延遲休眠支援

7.9 版本引入延遲休眠支援,令用戶喺電源管理上有更大彈性。呢個功能允許系統排程休眠事件,令桌面同伺服器部署可以採用更進階嘅電源管理策略。

下載同文檔

OpenBSD 7.9 而家已經可以喺項目官方網站下載。版本附上完整文檔,詳細說明所有改動、安全升級同硬件相容性更新。同所有 OpenBSD 版本一樣,7.9 依然強調程式碼正確性、安全同穩定,而唔係盲目追求新功能,維持咗喺 BSD 生態系入面獨特嘅哲學。

呢個版本繼續 OpenBSD 每六個月一次嘅更新週期傳統,令用戶可以掌握可預期嘅更新時間表,持續獲得安全升級同硬件支援嘅改善。

原文連結 / Original Article


Compromised Nx Console Extension Targets 2.2M VS Code Developers with Credential Stealer

Written by AI Press Team on 2026-05-20 09:00:00.

Compromised Nx Console Extension Targets 2.2M VS Code Developers with Credential Stealer

A compromised version of the popular Nx Console extension for Visual Studio Code has been discovered stealing developer credentials, affecting more than 2.2 million installations in what security researchers are calling a significant supply chain attack on the developer community.

According to The Hacker News, cybersecurity researchers have identified version 18.95.0 of the rwl.angular.console package as containing malicious code designed to harvest sensitive credentials from affected developers' systems. The extension, which serves as a user interface and plugin for code editors including VS Code, Cursor, and JetBrains IDEs, had accumulated substantial trust within the development community before the compromise was detected.

The attack represents a concerning example of supply chain infiltration targeting software development tooling. By compromising a widely-used extension, attackers gained potential access to developer environments where sensitive credentials, API keys, and authentication tokens are routinely stored and used.

Technical Impact and Risks

The credential-stealing payload embedded in the malicious version poses particular risks to development teams and organizations. Developer workstations often contain elevated access privileges, including CI/CD pipeline credentials, cloud provider API keys, and repository access tokens. Compromise of these credentials could enable attackers to infiltrate build systems, deploy malicious code, or access production environments.

Security implications extend beyond individual developers to entire organizations. A single compromised developer workstation could provide attackers with a foothold into corporate networks and development infrastructure, potentially enabling lateral movement and broader system compromise.

Supply Chain Attack Mechanics

This incident highlights the persistent vulnerability of software supply chains, particularly in open-source and extension ecosystems. Attackers increasingly target popular development tools because they offer direct access to valuable credentials and provide a trusted vector for malware distribution.

The compromise of rwl.angular.console version 18.95.0 suggests attackers may have gained access to the legitimate publishing pipeline or successfully impersonated the package maintainers. The extension's substantial installation base—exceeding 2.2 million downloads—made it an attractive target for credential harvesting operations.

Community Response and Mitigation

The malicious version has reportedly been removed from the VS Code Marketplace, though the exact timeline of publication and removal remains unclear. Developers who installed version 18.95.0 of the Nx Console extension are advised to immediately rotate any credentials that may have been exposed and scan their systems for indicators of compromise.

Organizations should consider implementing extension allowlisting policies and monitoring development environments for unauthorized or suspicious extensions. Regular auditing of installed extensions and their versions can help detect similar compromises before significant damage occurs.

Limitations and Ongoing Investigation

Specific technical indicators of compromise, including package hashes, exact publisher identification details, and precise publication and removal timestamps, have not been made publicly available in the initial reporting. This limitation complicates detection and response efforts for security teams seeking to identify affected systems.

The exact publisher ID of the compromised package versus the legitimate Nx Console publisher remains unconfirmed, as does the method by which attackers gained the ability to publish the malicious version. These details are critical for understanding the full scope of the compromise and preventing similar incidents.

Broader Implications for Developer Security

This incident underscores the importance of supply chain security in development tooling. As developers increasingly rely on third-party extensions and packages to enhance productivity, the attack surface for credential theft and system compromise expands accordingly.

Security teams should prioritize extension inventory management, implement version pinning where possible, and maintain awareness of security advisories affecting development tooling. The developer community must balance convenience and functionality with security considerations when selecting and updating extensions.

The compromise of a tool with over 2.2 million installations highlights the risks facing the development ecosystem from supply chain attacks. Vigilance, rapid response, and comprehensive credential management remain essential defenses against these threats.


遭駲嘅 Nx Console 擴充功能瞄準 220 萬 VS Code 開發者,內藏竊取密碼嘅惡意程式

安全研究人員發現,Visual Studio Code 嘅熱門擴充功能 Nx Console 有一個版本遭人駲入,而家正喺度偷取開發者嘅密碼同認證資料。呢個事件影響咗超過 220 萬個安裝,保安專家話係針對開發者社群嘅一次重大供應鏈攻擊。

據 The Hacker News 報道,保安研究人員已經確認 rwl.angular.console 套件嘅 18.95.0 版本內藏惡意程式,專門用嚟從受影響開發者嘅系統度竊取敏感認證資料。呢個擴充功能原本係為咗畀 VS Code、Cursor 同 JetBrains IDE 等編碼工具做介面同插件用,喺被發現遭駲之前,已經喺開發者社群累積咗好大嘅信任度。

呢次攻擊正正係針對軟件開發工具嘅供應鏈滲透一個令人擔憂嘅例子。攻擊者透過駲入一個廣泛使用嘅擴充功能,有機會直接接觸到開發者嘅工作環境,而家啲敏感密碼、API 金鑰同認證令牌通常都係喺度儲存同使用。

技術影響同風險

惡意版本入面嵌入嘅取證程式,對開發團隊同企業嚟講特別危險。開發者嘅工作電腦通常都有較高嘅存取權限,包括 CI/CD 流水線嘅認證資料、雲端供應商嘅 API 金鑰同倉庫存取令牌。一旦啲密碼被駲,攻擊者就可以滲透進構建系統、部署惡意程式,或者直接存取生產環境。

保安影響唔止係針對個別開發者,仲會擴散到整間公司。只要有一台開發者嘅電腦被駲,攻擊者就可以借此打入企業網絡同開發基礎設施,甚至有機會向其他系統橫向移動,令更多設備受影響。

供應鏈攻擊手法

呢個事件凸顯咗軟件供應鏈一直以來嘅弱點,尤其係開源同擴充功能生態系統。而家攻擊者越嚟越鍾意瞄準熱門嘅開發工具,因為佢哋可以直接接觸到寶貴嘅認證資料,同時又可以利用開發者嘅信任來散播惡意程式。

rwl.angular.console 18.95.0 版本遭人駲,顯示攻擊者可能已經搵到合法發布管道嘅入口,或者成功假冒咗套件嘅維護者。呢個擴充功能嘅安裝量高達超過 220 萬次下載,自然成為竊取密碼嘅理想目標。

社群反應同應對措施

據報呢個惡意版本已經從 VS Code Marketplace 下架,不過具體嘅上架同下架時間仲未清楚。安裝咗 Nx Console 擴充功能 18.95.0 版本嘅開發者,建議即刻更換所有可能被洩露嘅密碼,並掃描自己嘅系統檢查有冇受感染嘅跡象。

企業應該考慮實施擴充功能白名單政策,並密切監控開發環境有冇未經授權或者可疑嘅插件。定期檢查已安裝嘅擴充功能同版本,可以幫手喺造成大禍之前,早啲發現類似嘅入侵事件。

限制同持續調查

初步報道仲未公開具體嘅技術受感染指標,例如套件嘅雜湊值、出版商嘅詳細識別資料,同精確嘅上架下架時間戳。呢個限制令保安團隊喺識別受影響系統同應對方面變得更加困難。

遭人駲套件嘅出版商 ID 同原本合法嘅 Nx Console 出版商 ID 係咪同一個,仲未得到確認。攻擊者係點樣搵到發布惡意版本嘅權限,亦都未清楚。呢啲細節對於了解事件嘅完整範圍同防止類似事件再發生至關重要。

對開發者保安嘅深遠影響

呢個事件再次強調咗開發工具供應鏈保安嘅重要性。而家開發者越嚟越依賴第三方擴充功能同套件嚟提升工作效率,相對地,密碼被偷同系統被駲嘅攻擊面亦都隨之擴大。

保安團隊應該優先管理擴充功能嘅庫存,盡可能實施版本鎖定,並密切留意影響開發工具嘅保安通告。開發者社群喺揀選同更新擴充功能嘅時候,一定要喺方便實用同保安考量之間取得平衡。

一個安裝量超過 220 萬嘅工具遭人駲,正正點出咗開發生態系統喺供應鏈攻擊下面臨嘅風險。保持警覺、快速應對同全面管理密碼,依然係抵禦呢類威脅嘅必要防線。

原文連結 / Original Article


More...