Article Details

Scrape Timestamp (UTC): 2025-11-10 09:01:15.410

Source: https://thehackernews.com/2025/11/glassworm-malware-discovered-in-three.html

Original Article Text

Click to Toggle View

GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs. Cybersecurity researchers have disclosed a new set of three extensions associated with the GlassWorm campaign, indicating continued attempts on part of threat actors to target the Visual Studio Code (VS Code) ecosystem. The extensions in question, which are still available for download, are listed below - GlassWorm, first documented by Koi Security late last month, refers to a campaign in which threat actors leverage VS Code extensions on the Open VSX Registry and the Microsoft Extension Marketplace to harvest Open VSX, GitHub, and Git credentials, drain funds from 49 different cryptocurrency wallet extensions, and drop additional tools for remote access. What makes the malware notable is that it uses invisible Unicode characters to hide malicious code in code editors and abuses the pilfered credentials to compromise additional extensions and further extend its reach, effectively creating a self-replication cycle that allows it to spread in a worm-like fashion. In response to the findings, Open VSX said it identified and removed all malicious extensions, in addition to rotating or revoking associated tokens as of October 21, 2025. However, the latest report from Koi Security shows that the threat has resurfaced a second time, using the same invisible Unicode character obfuscation trick to bypass detection. "The attacker has posted a fresh transaction to the Solana blockchain, providing an updated C2 [command-and-control] endpoint for downloading the next-stage payload," security researchers Idan Dardikman, Yuval Ronen, and Lotan Sery said. "This demonstrates the resilience of blockchain-based C2 infrastructure - even if payload servers are taken down, the attacker can post a new transaction for a fraction of a cent, and all infected machines automatically fetch the new location." The security vendor also revealed it identified an endpoint that's said to have been inadvertently exposed on the attacker's server, uncovering a partial list of victims spanning the U.S., South America, Europe, and Asia. This includes a major government entity from the Middle East. Further analysis has uncovered keylogger information supposedly from the attacker's own machine, which has yielded some clues as to GlassWorm's provenance. The threat actor is assessed to be Russian-speaking and is said to use an open-source browser extension C2 framework named RedExt as part of their infrastructure. "These are real organizations and real people whose credentials have been harvested, whose machines may be serving as criminal proxy infrastructure, whose internal networks may already be compromised," Koi Security said. The development comes shortly after Aikido Security published findings showing that GlassWorm has expanded its focus to target GitHub, indicating the stolen GitHub credentials are being used to push malicious commits to repositories.

Daily Brief Summary

MALWARE // GlassWorm Malware Targets VS Code Extensions, Compromises GitHub Credentials

Cybersecurity experts have identified GlassWorm malware in three Visual Studio Code extensions, impacting thousands of users by harvesting credentials and targeting cryptocurrency wallets.

GlassWorm employs invisible Unicode characters to conceal malicious code, allowing it to self-replicate and spread across the VS Code ecosystem.

Despite efforts to remove malicious extensions, the threat has resurfaced, using blockchain-based command-and-control infrastructure to evade detection and maintain persistence.

The malware's reach extends globally, affecting victims in the U.S., South America, Europe, and Asia, including a significant government entity in the Middle East.

Researchers traced the malware's origin to a Russian-speaking threat actor utilizing the RedExt framework, with evidence suggesting compromised internal networks and proxy infrastructure.

Koi Security's findings indicate GlassWorm has expanded its scope to include GitHub, using stolen credentials to inject malicious commits into repositories.

Organizations are urged to review their security protocols, rotate credentials, and monitor for unusual activity to mitigate potential impacts from this ongoing threat.