GlassWorm malware targets OpenVSX, VS Code registries
Summary
Hide ▲
Show ▼
The GlassWorm malware campaign has resurfaced with a third wave, adding 24 new packages to OpenVSX and Microsoft Visual Studio Marketplace. The malware uses invisible Unicode characters to hide malicious code and targets GitHub, NPM, and OpenVSX account credentials, as well as cryptocurrency wallet data. The campaign initially impacted 49 extensions, with an estimated 35,800 downloads, though this figure includes inflated numbers due to bots and visibility-boosting tactics. The Eclipse Foundation has revoked leaked tokens and introduced security measures, but the threat actors have pivoted to GitHub and now returned to OpenVSX with updated command-and-control endpoints. The malware's global reach includes systems in the United States, South America, Europe, Asia, and a government entity in the Middle East. Koi Security has accessed the attackers' server and shared victim data with law enforcement. The threat actors have posted a fresh transaction to the Solana blockchain, providing an updated C2 endpoint for downloading the next-stage payload. The attacker's server was inadvertently exposed, revealing a partial list of victims spanning the U.S., South America, Europe, and Asia, including a major government entity from the Middle East. The threat actor is assessed to be Russian-speaking and uses the open-source browser extension C2 framework named RedExt as part of their infrastructure. The third wave of Glassworm uses Rust-based implants packaged inside the extensions and targets popular tools and developer frameworks like Flutter, Vim, Yaml, Tailwind, Svelte, React Native, and Vue. Additionally, a malicious Rust package named "evm-units" was discovered, targeting Windows, macOS, and Linux systems. This package, uploaded to crates.io in mid-April 2025, attracted over 7,000 downloads and was designed to stealthily execute on developer machines by masquerading as an Ethereum Virtual Machine (EVM) unit helper tool. The package checks for the presence of Qihoo 360 antivirus and alters its execution flow accordingly. The references to EVM and Uniswap indicate that the supply chain incident is designed to target developers in the Web3 space. The latest development involves the compromise of a legitimate developer's resources to push malicious updates to downstream users, with the malicious extensions having previously been presented as legitimate developer utilities and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases. A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems. The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times. GlassWorm attacks first appeared in late October, hiding the malicious code using "invisible" Unicode characters to steal cryptocurrency wallet and developer account details. The malware also supports VNC-based remote access and SOCKS proxying. Over time and across multiple attack waves, GlassWorm impacted both Microsoft's official Visual Studio Code marketplace and its open-source alternative for unsupported IDEs, OpenVSX. In a previous campaign, GlassWorm showed signs of evolution, targeting macOS systems, and its developers were working to add a replacement mechanism for the Trezor and Ledger apps. A new report from Socket's security team describes a new campaign that relied on trojanizing the following extensions: oorzc.ssh-tools v0.5.1, oorzc.i18n-tools-plus v1.6.8, oorzc.mind-map v1.0.61, oorzc.scss-to-css-compile v1.3.4. The malicious updates were pushed on January 30, and Socket reports that the extensions had been innocuous for two years. This suggests that the oorzc account was most likely compromised by GlassWorm operators. According to the researchers, the campaign targets macOS systems exclusively, pulling instructions from Solana transaction memos. Notably, Russian-locale systems are excluded, which may hint at the origin of the attacker. GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login. It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251. Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases. The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases. Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords.
Timeline
-
08.11.2025 18:17 6 articles · 2mo ago
GlassWorm operators identified as Russian-speaking using RedExt C2 framework
GlassWorm operators are Russian-speaking and use the RedExt open-source C2 browser extension framework. The malware has impacted systems globally, including the United States, South America, Europe, Asia, and a government entity in the Middle East. Koi Security accessed the attackers' server and obtained key data on victims, including user IDs for multiple cryptocurrency exchanges and messaging platforms. The threat actors have posted a fresh transaction to the Solana blockchain, providing an updated C2 endpoint for downloading the next-stage payload. The attacker's server was inadvertently exposed, revealing a partial list of victims spanning the U.S., South America, Europe, and Asia, including a major government entity from the Middle East. The Glassworm campaign is now in its third wave, with 24 new packages added on OpenVSX and Microsoft Visual Studio Marketplace. The malware now uses Rust-based implants and continues to employ invisible Unicode characters to hide malicious code. The packages target popular developer tools and frameworks, and the campaign uses artificially inflated download counts to manipulate search results. The third wave includes specific packages on both marketplaces, indicating a broad targeting scope. The new iteration of GlassWorm uses Rust-based implants packaged inside the extensions, targeting Windows and macOS systems. The implants fetch C2 server details from a Solana blockchain wallet address and use Google Calendar as a backup for C2 address retrieval. Additionally, a malicious Rust package named "evm-units" was discovered, targeting Windows, macOS, and Linux systems. This package, uploaded to crates.io in mid-April 2025, attracted over 7,000 downloads and was designed to stealthily execute on developer machines by masquerading as an Ethereum Virtual Machine (EVM) unit helper tool. The package checks for the presence of Qihoo 360 antivirus and alters its execution flow accordingly. The references to EVM and Uniswap indicate that the supply chain incident is designed to target developers in the Web3 space. The latest development involves the compromise of a legitimate developer's resources to push malicious updates to downstream users, with the malicious extensions having previously been presented as legitimate developer utilities and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases. A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems. The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times. GlassWorm attacks first appeared in late October, hiding the malicious code using "invisible" Unicode characters to steal cryptocurrency wallet and developer account details. The malware also supports VNC-based remote access and SOCKS proxying. Over time and across multiple attack waves, GlassWorm impacted both Microsoft's official Visual Studio Code marketplace and its open-source alternative for unsupported IDEs, OpenVSX. In a previous campaign, GlassWorm showed signs of evolution, targeting macOS systems, and its developers were working to add a replacement mechanism for the Trezor and Ledger apps. A new report from Socket's security team describes a new campaign that relied on trojanizing the following extensions: oorzc.ssh-tools v0.5.1, oorzc.i18n-tools-plus v1.6.8, oorzc.mind-map v1.0.61, oorzc.scss-to-css-compile v1.3.4. The malicious updates were pushed on January 30, and Socket reports that the extensions had been innocuous for two years. This suggests that the oorzc account was most likely compromised by GlassWorm operators. According to the researchers, the campaign targets macOS systems exclusively, pulling instructions from Solana transaction memos. Notably, Russian-locale systems are excluded, which may hint at the origin of the attacker. GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login. It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251. Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases. The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases. Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords.
Show sources
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
02.11.2025 17:09 4 articles · 3mo ago
GlassWorm threat actors pivot to GitHub using Unicode steganography
The threat actors behind GlassWorm have moved to GitHub, using the same Unicode steganography trick to hide their malicious payload in multiple repositories, primarily focused on JavaScript projects. GlassWorm has returned with three new VSCode extensions on OpenVSX, downloaded over 10,000 times. The new extensions are ai-driven-dev.ai-driven-dev (3,400 downloads), adhamu.history-in-sublime-merge (4,000 downloads), and yasuyuky.transient-emacs (2,400 downloads). The latest development involves the compromise of a legitimate developer's resources to push malicious updates to downstream users, with the malicious extensions having previously been presented as legitimate developer utilities and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases. A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems. The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times. GlassWorm attacks first appeared in late October, hiding the malicious code using "invisible" Unicode characters to steal cryptocurrency wallet and developer account details. The malware also supports VNC-based remote access and SOCKS proxying. Over time and across multiple attack waves, GlassWorm impacted both Microsoft's official Visual Studio Code marketplace and its open-source alternative for unsupported IDEs, OpenVSX. In a previous campaign, GlassWorm showed signs of evolution, targeting macOS systems, and its developers were working to add a replacement mechanism for the Trezor and Ledger apps. A new report from Socket's security team describes a new campaign that relied on trojanizing the following extensions: oorzc.ssh-tools v0.5.1, oorzc.i18n-tools-plus v1.6.8, oorzc.mind-map v1.0.61, oorzc.scss-to-css-compile v1.3.4. The malicious updates were pushed on January 30, and Socket reports that the extensions had been innocuous for two years. This suggests that the oorzc account was most likely compromised by GlassWorm operators. According to the researchers, the campaign targets macOS systems exclusively, pulling instructions from Solana transaction memos. Notably, Russian-locale systems are excluded, which may hint at the origin of the attacker. GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login. It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251. Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases. The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases. Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords.
Show sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
31.10.2025 10:02 5 articles · 3mo ago
Eclipse Foundation revokes leaked tokens and introduces security measures
Open VSX has implemented additional security measures, including shortening token lifetimes, faster revocation workflows, automated security scans, and threat intelligence sharing. The threat actors behind GlassWorm have moved to GitHub, using the same Unicode steganography trick to hide their malicious payload in multiple repositories, primarily focused on JavaScript projects. The latest development involves the compromise of a legitimate developer's resources to push malicious updates to downstream users, with the malicious extensions having previously been presented as legitimate developer utilities and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases. A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems. The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times. GlassWorm attacks first appeared in late October, hiding the malicious code using "invisible" Unicode characters to steal cryptocurrency wallet and developer account details. The malware also supports VNC-based remote access and SOCKS proxying. Over time and across multiple attack waves, GlassWorm impacted both Microsoft's official Visual Studio Code marketplace and its open-source alternative for unsupported IDEs, OpenVSX. In a previous campaign, GlassWorm showed signs of evolution, targeting macOS systems, and its developers were working to add a replacement mechanism for the Trezor and Ledger apps. A new report from Socket's security team describes a new campaign that relied on trojanizing the following extensions: oorzc.ssh-tools v0.5.1, oorzc.i18n-tools-plus v1.6.8, oorzc.mind-map v1.0.61, oorzc.scss-to-css-compile v1.3.4. The malicious updates were pushed on January 30, and Socket reports that the extensions had been innocuous for two years. This suggests that the oorzc account was most likely compromised by GlassWorm operators. According to the researchers, the campaign targets macOS systems exclusively, pulling instructions from Solana transaction memos. Notably, Russian-locale systems are excluded, which may hint at the origin of the attacker. GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login. It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251. Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases. The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases. Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords.
Show sources
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
20.10.2025 19:13 11 articles · 3mo ago
GlassWorm malware campaign targets OpenVSX and VS Code registries
The Open VSX registry rotated access tokens after they were accidentally leaked by developers in public repositories, enabling the supply chain attack. The leak was discovered by Wiz researchers two weeks ago, exposing over 550 secrets across Microsoft VSCode and Open VSX marketplaces. Some leaked tokens could give access to projects with 150,000 downloads, allowing threat actors to upload malicious versions of extensions. The Open VSX team and the Eclipse Foundation clarified that GlassWorm was not self-replicating but targeted developer credentials. The reported download count of 35,800 includes inflated downloads generated by bots and visibility-boosting tactics. The threat actors behind GlassWorm have moved to GitHub, using the same Unicode steganography trick to hide their malicious payload in multiple repositories, primarily focused on JavaScript projects. GlassWorm has returned with three new VSCode extensions on OpenVSX, downloaded over 10,000 times. The new extensions are ai-driven-dev.ai-driven-dev (3,402 downloads), adhamu.history-in-sublime-merge (4,057 downloads), and yasuyuky.transient-emacs (2,431 downloads). The threat actors have posted a fresh transaction to the Solana blockchain, providing an updated C2 endpoint for downloading the next-stage payload. The attacker's server was inadvertently exposed, revealing a partial list of victims spanning the U.S., South America, Europe, and Asia, including a major government entity from the Middle East. The threat actor is assessed to be Russian-speaking and uses the open-source browser extension C2 framework named RedExt as part of their infrastructure. The Glassworm campaign is now in its third wave, with 24 new packages added on OpenVSX and Microsoft Visual Studio Marketplace. The malware now uses Rust-based implants and continues to employ invisible Unicode characters to hide malicious code. The packages target popular developer tools and frameworks, and the campaign uses artificially inflated download counts to manipulate search results. The third wave includes specific packages on both marketplaces, indicating a broad targeting scope. The new iteration of GlassWorm uses Rust-based implants packaged inside the extensions, targeting Windows and macOS systems. The implants fetch C2 server details from a Solana blockchain wallet address and use Google Calendar as a backup for C2 address retrieval. Additionally, a malicious Rust package named "evm-units" was discovered, targeting Windows, macOS, and Linux systems. This package, uploaded to crates.io in mid-April 2025, attracted over 7,000 downloads and was designed to stealthily execute on developer machines by masquerading as an Ethereum Virtual Machine (EVM) unit helper tool. The package checks for the presence of Qihoo 360 antivirus and alters its execution flow accordingly. The references to EVM and Uniswap indicate that the supply chain incident is designed to target developers in the Web3 space. The latest development involves the compromise of a legitimate developer's resources to push malicious updates to downstream users, with the malicious extensions having previously been presented as legitimate developer utilities and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases. A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems. The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times. GlassWorm attacks first appeared in late October, hiding the malicious code using "invisible" Unicode characters to steal cryptocurrency wallet and developer account details. The malware also supports VNC-based remote access and SOCKS proxying. Over time and across multiple attack waves, GlassWorm impacted both Microsoft's official Visual Studio Code marketplace and its open-source alternative for unsupported IDEs, OpenVSX. In a previous campaign, GlassWorm showed signs of evolution, targeting macOS systems, and its developers were working to add a replacement mechanism for the Trezor and Ledger apps. A new report from Socket's security team describes a new campaign that relied on trojanizing the following extensions: oorzc.ssh-tools v0.5.1, oorzc.i18n-tools-plus v1.6.8, oorzc.mind-map v1.0.61, oorzc.scss-to-css-compile v1.3.4. The malicious updates were pushed on January 30, and Socket reports that the extensions had been innocuous for two years. This suggests that the oorzc account was most likely compromised by GlassWorm operators. According to the researchers, the campaign targets macOS systems exclusively, pulling instructions from Solana transaction memos. Notably, Russian-locale systems are excluded, which may hint at the origin of the attacker. GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login. It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251. Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases. The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases. Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords.
Show sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
Information Snippets
-
GlassWorm uses invisible Unicode characters to hide malicious code.
First reported: 20.10.2025 19:132 sources, 10 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The malware steals credentials for GitHub, npm, and OpenVSX accounts, as well as cryptocurrency wallet data.
First reported: 20.10.2025 19:132 sources, 11 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
GlassWorm deploys a SOCKS proxy and VNC clients for remote access.
First reported: 20.10.2025 19:132 sources, 7 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The final payload, ZOMBI, turns infected systems into nodes for criminal activities.
First reported: 20.10.2025 19:132 sources, 6 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The malware uses the Solana blockchain for command-and-control, making takedowns difficult.
First reported: 20.10.2025 19:132 sources, 9 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Google Calendar and BitTorrent’s Distributed Hash Table (DHT) are used for payload distribution and command distribution.
First reported: 20.10.2025 19:132 sources, 7 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
At least 11 extensions on OpenVSX and one on Microsoft’s VS Code Marketplace were compromised.
First reported: 20.10.2025 19:132 sources, 5 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The malware has been installed an estimated 35,800 times.
First reported: 20.10.2025 19:132 sources, 7 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The GlassWorm malware is the second supply chain attack to hit the DevOps space within a month, following the Shai-Hulud worm that targeted the npm ecosystem in mid-September 2025.
First reported: 24.10.2025 10:002 sources, 4 articlesShow sources
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The first wave of GlassWorm infections occurred on October 17, 2025.
First reported: 24.10.2025 10:002 sources, 4 articlesShow sources
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The malicious code within the extensions searches for transactions associated with an attacker-controlled wallet on the Solana blockchain to extract a Base64-encoded string from the memo field.
First reported: 24.10.2025 10:002 sources, 4 articlesShow sources
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The Zombi payload includes WebRTC modules for peer-to-peer communication and BitTorrent's Distributed Hash Table (DHT) for decentralized command distribution.
First reported: 24.10.2025 10:002 sources, 4 articlesShow sources
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
VS Code extensions are configured to auto-update, allowing threat actors to push malicious code automatically without requiring user interaction.
First reported: 24.10.2025 10:002 sources, 6 articlesShow sources
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The GlassWorm campaign is designed to spread autonomously through the software development ecosystem.
First reported: 24.10.2025 10:002 sources, 6 articlesShow sources
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Eclipse Foundation revoked a small number of leaked tokens within Visual Studio Code extensions.
First reported: 31.10.2025 10:022 sources, 4 articlesShow sources
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The GlassWorm campaign does not involve a self-replicating worm but requires stolen developer credentials to spread.
First reported: 31.10.2025 10:022 sources, 5 articlesShow sources
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The reported download count of 35,800 includes inflated downloads generated by bots and visibility-boosting tactics.
First reported: 31.10.2025 10:022 sources, 6 articlesShow sources
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Open VSX introduced a token prefix format "ovsxp_" to scan for exposed tokens.
First reported: 31.10.2025 10:022 sources, 5 articlesShow sources
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Open VSX is enforcing security changes to bolster the supply chain, including reducing token lifetime limits, making token revocation easier, and automated scanning of extensions.
First reported: 31.10.2025 10:022 sources, 5 articlesShow sources
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The Open VSX registry rotated access tokens after they were accidentally leaked by developers in public repositories, enabling the supply chain attack.
First reported: 02.11.2025 17:092 sources, 4 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The leak was discovered by Wiz researchers two weeks ago, exposing over 550 secrets across Microsoft VSCode and Open VSX marketplaces.
First reported: 02.11.2025 17:092 sources, 4 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Some leaked tokens could give access to projects with 150,000 downloads, allowing threat actors to upload malicious versions of extensions.
First reported: 02.11.2025 17:092 sources, 5 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Open VSX serves as a community-driven registry for VS Code-compatible extensions used on AI-powered forks like Cursor and Windsurf.
First reported: 02.11.2025 17:092 sources, 4 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The Open VSX team and the Eclipse Foundation clarified that GlassWorm was not self-replicating but targeted developer credentials.
First reported: 02.11.2025 17:092 sources, 5 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The reported download count of 35,800 includes inflated downloads generated by bots and visibility-boosting tactics.
First reported: 02.11.2025 17:092 sources, 4 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Open VSX has implemented additional security measures, including shortening token lifetimes, faster revocation workflows, automated security scans, and threat intelligence sharing.
First reported: 02.11.2025 17:092 sources, 4 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The threat actors behind GlassWorm have moved to GitHub, using the same Unicode steganography trick to hide their malicious payload in multiple repositories, primarily focused on JavaScript projects.
First reported: 02.11.2025 17:092 sources, 6 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
GlassWorm has returned with three new VSCode extensions on OpenVSX, downloaded over 10,000 times.
First reported: 08.11.2025 18:172 sources, 6 articlesShow sources
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The new extensions are ai-driven-dev.ai-driven-dev (3,400 downloads), adhamu.history-in-sublime-merge (4,000 downloads), and yasuyuky.transient-emacs (2,400 downloads).
First reported: 08.11.2025 18:172 sources, 6 articlesShow sources
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
GlassWorm operators are Russian-speaking and use the RedExt open-source C2 browser extension framework.
First reported: 08.11.2025 18:172 sources, 5 articlesShow sources
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
GlassWorm has impacted systems globally, including the United States, South America, Europe, Asia, and a government entity in the Middle East.
First reported: 08.11.2025 18:172 sources, 5 articlesShow sources
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Koi Security accessed the attackers' server and obtained key data on victims, including user IDs for multiple cryptocurrency exchanges and messaging platforms.
First reported: 08.11.2025 18:172 sources, 5 articlesShow sources
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The threat actors have posted a fresh transaction to the Solana blockchain, providing an updated C2 endpoint for downloading the next-stage payload.
First reported: 10.11.2025 10:512 sources, 4 articlesShow sources
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The attacker's server was inadvertently exposed, revealing a partial list of victims spanning the U.S., South America, Europe, and Asia, including a major government entity from the Middle East.
First reported: 10.11.2025 10:512 sources, 4 articlesShow sources
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The threat actor is assessed to be Russian-speaking and uses the open-source browser extension C2 framework named RedExt as part of their infrastructure.
First reported: 10.11.2025 10:512 sources, 4 articlesShow sources
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Glassworm campaign is now in its third wave, with 24 new packages added on OpenVSX and Microsoft Visual Studio Marketplace.
First reported: 01.12.2025 23:082 sources, 5 articlesShow sources
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The third wave of Glassworm uses Rust-based implants packaged inside the extensions.
First reported: 01.12.2025 23:082 sources, 5 articlesShow sources
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The packages target popular tools and developer frameworks like Flutter, Vim, Yaml, Tailwind, Svelte, React Native, and Vue.
First reported: 01.12.2025 23:082 sources, 5 articlesShow sources
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The malware uses artificially inflated download counts to manipulate search results and appear legitimate.
First reported: 01.12.2025 23:082 sources, 5 articlesShow sources
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The third wave of Glassworm includes packages such as iconkieftwo.icon-theme-materiall, prisma-inc.prisma-studio-assistance, prettier-vsc.vsce-prettier, flutcode.flutter-extension, csvmech.csvrainbow, codevsce.codelddb-vscode, saoudrizvsce.claude-devsce, clangdcode.clangd-vsce, cweijamysq.sync-settings-vscode, bphpburnsus.iconesvscode, klustfix.kluster-code-verify, vims-vsce.vscode-vim, yamlcode.yaml-vscode-extension, solblanco.svetle-vsce, vsceue.volar-vscode, redmat.vscode-quarkus-pro, msjsdreact.react-native-vsce on VS Marketplace and bphpburn.icons-vscode, tailwind-nuxt.tailwindcss-for-react, flutcode.flutter-extension, yamlcode.yaml-vscode-extension, saoudrizvsce.claude-dev, saoudrizvsce.claude-devsce, vitalik.solidity on Open VSX.
First reported: 01.12.2025 23:082 sources, 5 articlesShow sources
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
A malicious Rust package named "evm-units" was uploaded to crates.io in mid-April 2025 by a user named "ablerust."
First reported: 03.12.2025 10:392 sources, 3 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The package "evm-units" attracted more than 7,000 downloads over the past eight months.
First reported: 03.12.2025 10:392 sources, 3 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Another package created by the same author, "uniswap-utils," listed "evm-units" as a dependency and was downloaded over 7,400 times.
First reported: 03.12.2025 10:392 sources, 3 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The packages have since been removed from the package repository.
First reported: 03.12.2025 10:392 sources, 3 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The package is designed to check for the presence of the "qhsafetray.exe" process, an executable file associated with 360 Total Security.
First reported: 03.12.2025 10:392 sources, 3 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
On Linux, the package downloads a script, saves it in /tmp/init, and runs it in the background using the nohup command.
First reported: 03.12.2025 10:392 sources, 3 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
On macOS, the package downloads a file called init and runs it using osascript in the background with the nohup command.
First reported: 03.12.2025 10:392 sources, 3 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
On Windows, the package downloads and saves the payload as a PowerShell script file ("init.ps1") in the temp directory and checks running processes for "qhsafetray.exe," before invoking the script.
First reported: 03.12.2025 10:392 sources, 3 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
If the antivirus process is not present, the package creates a Visual Basic Script wrapper that runs a hidden PowerShell script with no visible window.
First reported: 03.12.2025 10:392 sources, 3 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
If the antivirus process is detected, the package slightly alters its execution flow by directly invoking PowerShell.
First reported: 03.12.2025 10:392 sources, 3 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The references to EVM and Uniswap indicate that the supply chain incident is designed to target developers in the Web3 space.
First reported: 03.12.2025 10:392 sources, 3 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The threat actor responsible for the malicious code embedded a cross-platform second-stage loader inside a seemingly harmless function.
First reported: 03.12.2025 10:392 sources, 3 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The dependency was pulled into another widely used package (uniswap-utils), allowing the malicious code to execute automatically during initialization.
First reported: 03.12.2025 10:392 sources, 3 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
GlassWorm malware was spread through compromised developer accounts on Open VSX.
First reported: 02.02.2026 07:042 sources, 2 articlesShow sources
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The malicious extensions had previously been presented as legitimate developer utilities and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases.
First reported: 02.02.2026 07:042 sources, 2 articlesShow sources
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The compromised extensions include FTP/SFTP/SSH Sync Tool (oorzc.ssh-tools), I18n Tools (oorzc.i18n-tools-plus), vscode mindmap (oorzc.mind-map), and scss to css (oorzc.scss-to-css-compile).
First reported: 02.02.2026 07:042 sources, 2 articlesShow sources
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The malware targets data from Mozilla Firefox and Chromium-based browsers, cryptocurrency wallet files, iCloud Keychain database, Safari cookies, Apple Notes, user documents, FortiClient VPN configuration files, and developer credentials.
First reported: 02.02.2026 07:042 sources, 2 articlesShow sources
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The malware includes routines to locate and extract authentication material used in common workflows, including inspecting npm configuration for _authToken and referencing GitHub authentication artifacts.
First reported: 02.02.2026 07:042 sources, 2 articlesShow sources
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The threat actor blends into normal developer workflows, hides execution behind encrypted, runtime-decrypted loaders, and uses Solana memos as a dynamic dead drop to rotate staging infrastructure without republishing extensions.
First reported: 02.02.2026 07:042 sources, 2 articlesShow sources
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times.
First reported: 03.02.2026 00:041 source, 1 articleShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
GlassWorm attacks first appeared in late October, hiding the malicious code using "invisible" Unicode characters to steal cryptocurrency wallet and developer account details.
First reported: 03.02.2026 00:041 source, 1 articleShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The malware also supports VNC-based remote access and SOCKS proxying.
First reported: 03.02.2026 00:041 source, 1 articleShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
GlassWorm targeted macOS systems exclusively, pulling instructions from Solana transaction memos.
First reported: 03.02.2026 00:041 source, 1 articleShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Russian-locale systems are excluded, which may hint at the origin of the attacker.
First reported: 03.02.2026 00:041 source, 1 articleShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login.
First reported: 03.02.2026 00:041 source, 1 articleShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251.
First reported: 03.02.2026 00:041 source, 1 articleShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases.
First reported: 03.02.2026 00:041 source, 1 articleShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases.
First reported: 03.02.2026 00:041 source, 1 articleShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords.
First reported: 03.02.2026 00:041 source, 1 articleShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
Similar Happenings
ShadyPanda Browser Extensions Campaign Exploits 4.3M Installs
The ShadyPanda campaign has amassed over 4.3 million installations of malicious Chrome and Edge browser extensions, evolving from legitimate tools into spyware over multiple phases. The extensions, discovered by Koi Security, engaged in affiliate fraud, search hijacking, and remote code execution. The campaign remains active on the Microsoft Edge Add-ons platform, with one extension having 3 million installs. The extensions collect browsing history, search queries, keystrokes, mouse clicks, and other sensitive data, exfiltrating it to domains in China. Users are advised to remove these extensions and reset their account passwords. The ShadyPanda campaign used a supply-chain attack tactic by publishing or acquiring harmless extensions, letting them run clean for years to build trust and gain millions of installs, then suddenly flipping them into malware via silent updates. The compromised extensions became a fully fledged remote code execution (RCE) framework inside the browser, capable of downloading and running arbitrary JavaScript with full access to the browser's data and capabilities. The extensions could steal session cookies and tokens, allowing them to impersonate entire SaaS accounts such as Microsoft 365 or Google Workspace. The risk of malicious browser extensions extends beyond individual users, as they can access cookies, local storage, cloud auth sessions, active web content, and file downloads, blurring the line between endpoint security and cloud security. Organizations should enforce extension allow lists, treat extension access like OAuth access, audit extension permissions regularly, and monitor for suspicious extension behavior to reduce the risk of malicious extensions. Modern SaaS security platforms, such as Reco's Dynamic SaaS Security platform, can help organizations monitor and detect suspicious activity related to browser extensions in real time.
React Native CLI Remote Code Execution Vulnerability (CVE-2025-11953)
A critical security flaw in the React Native CLI package, tracked as CVE-2025-11953, allowed remote, unauthenticated attackers to execute arbitrary OS commands on development servers. The vulnerability affected versions 4.8.0 through 20.0.0-alpha.2 of the @react-native-community/cli-server-api package, impacting millions of developers using the React Native framework. The flaw was patched in version 20.0.0. The vulnerability is being actively exploited in the wild, with attacks observed on December 21, 2025, January 4, 2026, and January 21, 2026. The attacks involve delivering base-64 encoded PowerShell payloads hidden in the HTTP POST body of malicious requests. The payloads disable endpoint protections, establish a raw TCP connection to attacker-controlled infrastructure, write data to disk, and execute the downloaded binary. Approximately 3,500 exposed React Native Metro servers are still online, according to scans using the ZoomEye search engine. Despite active exploitation being observed for over a month, the vulnerability still carries a low score in the Exploit Prediction Scoring System (EPSS). The vulnerability affects Windows, Linux, and macOS systems, with varying levels of control over executed commands. The flaw was discovered by researchers at JFrog and disclosed in early November 2025. The vulnerability is dubbed Metro4Shell by VulnCheck. The Windows payload is a Rust-based UPX-packed binary with basic anti-analysis logic, and the same attacker infrastructure hosts corresponding Linux binaries, indicating cross-platform targeting.
Malicious VSX Extension SleepyDuck Targets Solidity Developers
A malicious extension named SleepyDuck was discovered in the Open VSX registry. It targets Solidity developers and includes a remote access trojan. The extension was initially published as benign but was updated to include malicious capabilities after reaching 14,000 downloads. The malware uses Ethereum contracts to update its command and control address, ensuring persistence even if the original server is taken down. It triggers when a new code editor window is opened or a .sol file is selected, gathering system information and exfiltrating it to the server. The extension has been downloaded more than 53,000 times. The malware activates on editor startup, when a Solidity file is opened, or when the user runs the Solidity compile command. It collects system data and sets up a command execution sandbox. The malware finds the fastest Ethereum RPC provider to read the smart contract with the C2 information and reads updated instructions directly from the blockchain. The extension was first published on October 31, 2025, and updated to include malicious code on November 1, 2025. It has been observed using sandbox evasion techniques and can connect to the fastest Ethereum RPC provider to maintain communication with its command server. Open VSX has announced security enhancements to make it safer for its users, including shortening token lifetimes, quickly revoking leaked credentials, automated scans, and sharing key info with VS Code about emerging threats.
HttpTroy Backdoor Deployed in Targeted South Korean Cyberattack
The North Korea-linked threat actor Kimsuky has been linked to a new campaign distributing a new variant of Android malware called DocSwap via QR codes hosted on phishing sites mimicking Seoul-based logistics firm CJ Logistics. The attack involved a ZIP file containing a Microsoft Windows screensaver (.scr) file, which displayed a PDF invoice written in Korean and loaded the attack chain until the backdoor program was running. The article also highlights the advanced obfuscation techniques used by HttpTroy to evade detection and the broader campaign by North Korean state-sponsored groups targeting various sectors. The attack is part of a broader campaign by North Korean state-sponsored groups targeting governments in the Asia-Pacific region, especially South Korea, as well as targets in the United States and Europe. Kimsuky has previously used password-protected ZIP files and AI-generated deepfake photos in their attacks. The groups use legitimate services and Windows processes to dodge security tools and different encryption methods for each step in a multistage infection chain. They also use techniques such as memory-resident execution and dynamic API resolution to help the malicious code avoid detection. Additionally, Kimsuky is targeting organizations involved in North Korea-related policy, research, and analysis, including non-governmental organizations, think tanks, academic institutions, strategic advisory firms, and government entities in the U.S. The group is using QR codes in phishing campaigns, a technique known as 'quishing,' to redirect victims to malicious locations disguised as questionnaires, secure drives, or fake login pages. The FBI has warned about Kimsuky's use of malicious QR codes in spear-phishing campaigns targeting entities in the U.S., highlighting the group's history of subverting email authentication protocols and exploiting improperly configured DMARC record policies. Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads, likely with the intent to deploy a remote access trojan (RAT). The activity delivers "weaponized files via Dynamic Link Library (DLL) sideloading, combined with a legitimate, open-source Python pen-testing script." The attack involves approaching high-value individuals through messages sent on LinkedIn, establishing trust, and deceiving them into downloading a malicious WinRAR self-extracting archive (SFX). Once launched, the archive extracts four different components: a legitimate open-source PDF reader application, a malicious DLL that's sideloaded by the PDF reader, a portable executable (PE) of the Python interpreter, and a RAR file that likely serves as a decoy. The infection chain gets activated when the PDF reader application is run, causing the rogue DLL to be sideloaded. The use of DLL side-loading has become an increasingly common technique adopted by threat actors to evade detection and conceal signs of malicious activity by taking advantage of legitimate processes. Over the past week, at least three documented campaigns have leveraged DLL side-loading to deliver malware families tracked as LOTUSLITE and PDFSIDER, along with other commodity trojans and information stealers. In the campaign observed by ReliaQuest, the sideloaded DLL is used to drop the Python interpreter onto the system and create a Windows Registry Run key that makes sure that the Python interpreter is automatically executed upon every login. The interpreter's primary responsibility is to execute a Base64-encoded open-source shellcode that's directly executed in memory to avoid leaving forensic artifacts on disk. The final payload attempts to communicate with an external server, granting the attackers persistent remote access to the compromised host and exfiltrating data of interest. The abuse of legitimate open-source tools, coupled with the use of phishing messages sent on social media platforms, shows that phishing attacks are not confined to emails alone and that alternative delivery methods can exploit security gaps to increase the odds of success and break into corporate environments. ReliaQuest told The Hacker News that the campaign appears to be broad and opportunistic, with activity spanning various sectors and regions. "That said, because this activity plays out in direct messages, and social media platforms are typically less monitored than email, it's difficult to quantify the full scale," it added. "This approach allows attackers to bypass detection and scale their operations with minimal effort while maintaining persistent control over compromised systems," the cybersecurity company said. "Once inside, they can escalate privileges, move laterally across networks, and exfiltrate data." This is not the first time LinkedIn has been misused for targeted attacks. In recent years, multiple North Korean threat actors, including those linked to the CryptoCore and Contagious Interview campaigns, have singled out victims by contacting them on LinkedIn under the pretext of a job opportunity and convincing them to run a malicious project as part of a supposed assessment or code review. In March 2025, Cofense also detailed a LinkedIn-themed phishing campaign that employs lures related to LinkedIn InMail notifications to get recipients to click on a "Read More" or "Reply To" button and download the remote desktop software developed by ConnectWise for gaining complete control over victim hosts. "Social media platforms commonly used by businesses represent a gap in most organizations' security posture," ReliaQuest said. "Unlike email, where organizations tend to have security monitoring tools, social media private messages lack visibility and security controls, making them an attractive delivery channel for phishing campaigns." "Organizations must recognize social media as a critical attack surface for initial access and extend their defenses beyond email-centric controls."
PhantomRaven npm credential harvesting campaign leverages invisible dependencies
An ongoing npm credential harvesting campaign dubbed PhantomRaven has been active since August 2025. The malware steals npm tokens, GitHub credentials, and CI/CD secrets from developers worldwide. At least 126 npm packages have been infected, resulting in over 86,000 downloads. The attack uses Remote Dynamic Dependencies (RDD) to hide malicious code in externally hosted packages, evading npm security scans. The campaign exploits AI hallucinations to create plausible-sounding package names, a technique known as slopsquatting. As of October 30, 2025, the attacker-controlled URL can serve any kind of malware, initially serving harmless code before pushing a malicious version. The malware scans the developer environment for email addresses and gathers information about the CI/CD environment. The npm ecosystem allows easy publishing and low friction for packages, with lifecycle scripts executing arbitrary code at install time. As of October 29, 2025, at least 80 of the infected packages remain active. Researchers have discovered a malicious npm package named "@acitons/artifact" that typosquats the legitimate "@actions/artifact" package to target GitHub-owned repositories. The package incorporated a post-install hook to download and run malware in versions 4.0.12 to 4.0.17, and has been downloaded 47,405 times. The malware specifically targets repositories owned by the GitHub organization, indicating a targeted attack against GitHub.