Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Glassworm Malware Strikes Again In VS Code

December 2, 2025
Reading Time: 3 mins read
in Alerts
Glassworm Malware Strikes Again In VS Code

The Glassworm campaign is a serious, ongoing malware attack targeting the developer community, specifically through malicious extensions uploaded to popular repositories for VS Code–compatible editors: the official Microsoft Visual Studio Marketplace and the vendor-neutral alternative, OpenVSX. These platforms are critical resources where developers install a variety of add-ons, including language support, tooling, and themes. The campaign first appeared in October and is now in its third wave, with researchers discovering 24 new packages on the two platforms, indicating a persistent threat despite initial clean-up efforts. The use of these marketplaces allows the malware to impersonate legitimate and essential developer tools, thereby maximizing its potential victim pool.

At the core of the Glassworm malware is its technique for evasion, first documented by Koi Security: it uses “invisible Unicode characters” to mask its malicious code, successfully hiding it from initial review processes on the repositories. Once a developer installs the compromised extension, the malware immediately executes its primary objective: data theft. It aggressively targets sensitive developer assets, attempting to steal GitHub, npm, and OpenVSX account credentials, alongside cryptocurrency wallet data. This broad targeting scope covers an extensive list of 49 extensions, underscoring the high value the attackers place on compromising developer environments and intellectual property.

Beyond credential and data harvesting, the malware establishes a significant level of control over the victim’s machine. It deploys a SOCKS proxy, which is used to covertly route subsequent malicious network traffic through the infected developer’s computer, obscuring the attackers’ origin. Furthermore, Glassworm installs the HVNC client (a High-Performance Virtual Network Computing client), which grants the operators stealthy remote access to the victim’s machine. This combination of tools provides the attackers with both a camouflaged operational channel and persistent, virtually undetectable control over the compromised development environment, dramatically escalating the potential for deeper security breaches.

The ongoing nature of the campaign is a major concern, as the malware has consistently re-emerged on both repositories shortly after previous extensions were removed. The third wave was discovered by Secure Annex researcher John Tuckner, and the new package names clearly demonstrate a sophisticated strategy of broad targeting. The malicious extensions are impersonating popular and widely used developer tools and frameworks such as Flutter, Vim, Yaml, Tailwind, Svelte, React Native, and Vue, making them highly likely to be downloaded by unsuspecting developers. The packages were found across both the VS Marketplace (17 packages) and Open VSX (7 packages).

A key tactic used by the malicious publishers to enhance the success of the infection is the manipulation of marketplace metrics. After their packages are accepted, the publishers push an update containing the malicious code and then engage in artificially inflating the download counts. This practice serves two critical purposes: it makes the extension appear legitimate and trustworthy to developers who often check download numbers, and it manipulates search results. By boosting their numbers, the malicious extension appears higher in search rankings, often placed directly next to the legitimate project it is impersonating, greatly increasing the chances of a developer mistakenly installing the malware.

Reference:

  • Glassworm Malware Launches New Attack Through Malicious VS Code Extensions
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityDecember 2025
ADVERTISEMENT

Related Posts

WinRAR Flaw Under Active Attack Now

Urgent Patches Issued For Major Flaws

December 10, 2025
WinRAR Flaw Under Active Attack Now

Microsoft Fixes Dozens Of Security Flaws

December 10, 2025
WinRAR Flaw Under Active Attack Now

WinRAR Flaw Under Active Attack Now

December 10, 2025
Android Malware Adds Stronger Data Theft

Sneeit RCE And ICTBroadcast Bug Power Attacks

December 8, 2025

MuddyWater Uses UDPGangster In Campaign

December 8, 2025
Android Malware Adds Stronger Data Theft

Android Malware Adds Stronger Data Theft

December 8, 2025

Latest Alerts

Urgent Patches Issued For Major Flaws

Microsoft Fixes Dozens Of Security Flaws

WinRAR Flaw Under Active Attack Now

Sneeit RCE And ICTBroadcast Bug Power Attacks

MuddyWater Uses UDPGangster In Campaign

Android Malware Adds Stronger Data Theft

Subscribe to our newsletter

    Latest Incidents

    Inotiv Reports Ransomware Data Breach

    Cyberattack Hits Leavenworth Services

    Cyber Outage Hits PES Energize Phones

    Honduran Vote System Faces Security Breach

    Petco Confirms Data Exposure Incident

    Hackers Hit Major Russian Logistics Firm

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial