Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Glassworm Found In Three VS Code Addons

November 11, 2025
Reading Time: 3 mins read
in Alerts
Delayed Payloads Hit Nuget Packages

A dangerous campaign known as GlassWorm continues to threaten the Visual Studio Code (VS Code) ecosystem, with cybersecurity researchers recently disclosing three additional malicious extensions designed to target users. These extensions—identified as ai-driven-dev.ai-driven-dev (with 3,402 downloads), adhamu.history-in-sublime-merge (with 4,057 downloads), and yasuyuky.transient-emacs (with 2,431 downloads)—remain available for download. The GlassWorm campaign, initially documented by Koi Security, is focused on leveraging compromised VS Code extensions found on both the Open VSX Registry and the Microsoft Extension Marketplace. Its core objective is to harvest crucial credentials for Open VSX, GitHub, and Git, along with draining funds from 49 different cryptocurrency wallet extensions, and deploying additional tools for remote access.

This malware is particularly notable for its stealth and propagation mechanism. It employs invisible Unicode characters to successfully conceal malicious code within the code editors, making it difficult to detect. Furthermore, it weaponizes the credentials it steals to compromise even more extensions, effectively establishing a self-replication loop that enables it to spread like a worm. While Open VSX responded to the initial threat by removing all identified malicious extensions and revoking associated tokens as of October 21, 2025, the problem has proven resilient. A recent report from Koi Security confirms the threat’s return, using the identical invisible Unicode character obfuscation technique to bypass security detections once again.

In a key finding, the attackers demonstrated the strength of their operational infrastructure. Security researchers Idan Dardikman, Yuval Ronen, and Lotan Sery revealed that the attacker posted a new transaction to the Solana blockchain, which provided an updated C2 (command-and-control) endpoint for downloading the next-stage payload. This highlights the robust nature of blockchain-based C2 infrastructure; even if servers distributing the payload are shut down, the threat actor can simply post a low-cost transaction to quickly update the new location, allowing all previously infected machines to automatically retrieve the new C2 address and continue operations.

Further investigations by the security vendor led to the identification of an inadvertently exposed endpoint on the attacker’s server, which provided a partial list of victims. This list spans multiple continents, including the U.S., South America, Europe, and Asia, and disturbingly includes a major government entity located in the Middle East. Analysis of keylogger information, potentially from the attacker’s own machine, offered some insights into the threat actor’s origin. The individual is assessed to be a Russian speaker who uses an open-source browser extension C2 framework called RedExt as a component of their operational infrastructure.

The consequences of this sophisticated campaign are substantial. Koi Security stressed the impact, stating that real organizations and individuals have had their credentials harvested, their machines potentially utilized as criminal proxy infrastructure, and their internal networks subjected to compromise. This ongoing development comes closely after Aikido Security published findings indicating that the GlassWorm campaign has broadened its scope to specifically target GitHub, confirming that the stolen GitHub credentials are being actively used to push malicious commits into legitimate repositories, further expanding the scale of the compromise.

Reference:

  • Glassworm Malware Found In Three VS Code Extensions With Thousands Of Installs
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

Albiriox Malware Hits Hundreds Of Apps

Google Meet Page Used To Deliver Malware

December 1, 2025
Tomiris Shifts To Public Service C2

Tomiris Shifts To Public Service C2

December 1, 2025
Albiriox Malware Hits Hundreds Of Apps

Albiriox Malware Hits Hundreds Of Apps

December 1, 2025
ShadowV2 Botnet Tests During AWS Outage

Bloody Wolf Widens Java RAT Campaign

November 28, 2025
ShadowV2 Botnet Tests During AWS Outage

Forge Library Patch Stops Signature Bypass

November 28, 2025
ShadowV2 Botnet Tests During AWS Outage

ShadowV2 Botnet Tests During AWS Outage

November 28, 2025

Latest Alerts

Google Meet Page Used To Deliver Malware

Tomiris Shifts To Public Service C2

Albiriox Malware Hits Hundreds Of Apps

Bloody Wolf Widens Java RAT Campaign

Forge Library Patch Stops Signature Bypass

ShadowV2 Botnet Tests During AWS Outage

Subscribe to our newsletter

    Latest Incidents

    Ecommerce Breach Exposes 34 Million

    Ransomware Hits Golf Manor Network

    Yearn Finance Hit By 9M Token Exploit

    Mazda Reports No Impact From Oracle Hack

    Asahi Breach Hits Two Million Users

    Qilin Ransomware Hits Korean MSP

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial