Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Glassworm Malware Strikes Again In VS Code

December 2, 2025
Reading Time: 3 mins read
in Alerts
Glassworm Malware Strikes Again In VS Code

The Glassworm campaign is a serious, ongoing malware attack targeting the developer community, specifically through malicious extensions uploaded to popular repositories for VS Code–compatible editors: the official Microsoft Visual Studio Marketplace and the vendor-neutral alternative, OpenVSX. These platforms are critical resources where developers install a variety of add-ons, including language support, tooling, and themes. The campaign first appeared in October and is now in its third wave, with researchers discovering 24 new packages on the two platforms, indicating a persistent threat despite initial clean-up efforts. The use of these marketplaces allows the malware to impersonate legitimate and essential developer tools, thereby maximizing its potential victim pool.

At the core of the Glassworm malware is its technique for evasion, first documented by Koi Security: it uses “invisible Unicode characters” to mask its malicious code, successfully hiding it from initial review processes on the repositories. Once a developer installs the compromised extension, the malware immediately executes its primary objective: data theft. It aggressively targets sensitive developer assets, attempting to steal GitHub, npm, and OpenVSX account credentials, alongside cryptocurrency wallet data. This broad targeting scope covers an extensive list of 49 extensions, underscoring the high value the attackers place on compromising developer environments and intellectual property.

Beyond credential and data harvesting, the malware establishes a significant level of control over the victim’s machine. It deploys a SOCKS proxy, which is used to covertly route subsequent malicious network traffic through the infected developer’s computer, obscuring the attackers’ origin. Furthermore, Glassworm installs the HVNC client (a High-Performance Virtual Network Computing client), which grants the operators stealthy remote access to the victim’s machine. This combination of tools provides the attackers with both a camouflaged operational channel and persistent, virtually undetectable control over the compromised development environment, dramatically escalating the potential for deeper security breaches.

The ongoing nature of the campaign is a major concern, as the malware has consistently re-emerged on both repositories shortly after previous extensions were removed. The third wave was discovered by Secure Annex researcher John Tuckner, and the new package names clearly demonstrate a sophisticated strategy of broad targeting. The malicious extensions are impersonating popular and widely used developer tools and frameworks such as Flutter, Vim, Yaml, Tailwind, Svelte, React Native, and Vue, making them highly likely to be downloaded by unsuspecting developers. The packages were found across both the VS Marketplace (17 packages) and Open VSX (7 packages).

A key tactic used by the malicious publishers to enhance the success of the infection is the manipulation of marketplace metrics. After their packages are accepted, the publishers push an update containing the malicious code and then engage in artificially inflating the download counts. This practice serves two critical purposes: it makes the extension appear legitimate and trustworthy to developers who often check download numbers, and it manipulates search results. By boosting their numbers, the malicious extension appears higher in search rankings, often placed directly next to the legitimate project it is impersonating, greatly increasing the chances of a developer mistakenly installing the malware.

Reference:

  • Glassworm Malware Launches New Attack Through Malicious VS Code Extensions
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityDecember 2025
ADVERTISEMENT

Related Posts

Glassworm Malware Strikes Again In VS Code

Shadypanda Extensions Hit Millions Users

December 2, 2025
Glassworm Malware Strikes Again In VS Code

Smarttube Breach Pushes Malicious Update

December 2, 2025
Albiriox Malware Hits Hundreds Of Apps

Google Meet Page Used To Deliver Malware

December 1, 2025
Tomiris Shifts To Public Service C2

Tomiris Shifts To Public Service C2

December 1, 2025
Albiriox Malware Hits Hundreds Of Apps

Albiriox Malware Hits Hundreds Of Apps

December 1, 2025
ShadowV2 Botnet Tests During AWS Outage

Bloody Wolf Widens Java RAT Campaign

November 28, 2025

Latest Alerts

Shadypanda Extensions Hit Millions Users

Smarttube Breach Pushes Malicious Update

Glassworm Malware Strikes Again In VS Code

Google Meet Page Used To Deliver Malware

Tomiris Shifts To Public Service C2

Albiriox Malware Hits Hundreds Of Apps

Subscribe to our newsletter

    Latest Incidents

    French Soccer Federation Suffers Cyberattack

    120,000 Cameras Hacked In South Korea

    Hackers Claim Mercedes Benz USA Breach

    Ecommerce Breach Exposes 34 Million

    Ransomware Hits Golf Manor Network

    Yearn Finance Hit By 9M Token Exploit

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial