By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs
Computing

GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs

News Room
Last updated: 2025/11/10 at 4:52 AM
News Room Published 10 November 2025
Share
GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs
SHARE

Nov 10, 2025Ravie LakshmananMalware / Threat Intelligence

Cybersecurity researchers have disclosed a new set of three extensions associated with the GlassWorm campaign, indicating continued attempts on part of threat actors to target the Visual Studio Code (VS Code) ecosystem.

The extensions in question, which are still available for download, are listed below –

DFIR Retainer Services

GlassWorm, first documented by Koi Security late last month, refers to a campaign in which threat actors leverage VS Code extensions on the Open VSX Registry and the Microsoft Extension Marketplace to harvest Open VSX, GitHub, and Git credentials, drain funds from 49 different cryptocurrency wallet extensions, and drop additional tools for remote access.

What makes the malware notable is that it uses invisible Unicode characters to hide malicious code in code editors and abuses the pilfered credentials to compromise additional extensions and further extend its reach, effectively creating a self-replication cycle that allows it to spread in a worm-like fashion.

In response to the findings, Open VSX said it identified and removed all malicious extensions, in addition to rotating or revoking associated tokens as of October 21, 2025. However, the latest report from Koi Security shows that the threat has resurfaced a second time, using the same invisible Unicode character obfuscation trick to bypass detection.

“The attacker has posted a fresh transaction to the Solana blockchain, providing an updated C2 [command-and-control] endpoint for downloading the next-stage payload,” security researchers Idan Dardikman, Yuval Ronen, and Lotan Sery said.

“This demonstrates the resilience of blockchain-based C2 infrastructure – even if payload servers are taken down, the attacker can post a new transaction for a fraction of a cent, and all infected machines automatically fetch the new location.”

The security vendor also revealed it identified an endpoint that’s said to have been inadvertently exposed on the attacker’s server, uncovering a partial list of victims spanning the U.S., South America, Europe, and Asia. This includes a major government entity from the Middle East.

CIS Build Kits

Further analysis has uncovered keylogger information supposedly from the attacker’s own machine, which has yielded some clues as to GlassWorm’s provenance. The threat actor is assessed to be Russian-speaking and is said to use an open-source browser extension C2 framework named RedExt as part of their infrastructure.

“These are real organizations and real people whose credentials have been harvested, whose machines may be serving as criminal proxy infrastructure, whose internal networks may already be compromised,” Koi Security said.

The development comes shortly after Aikido Security published findings showing that GlassWorm has expanded its focus to target GitHub, indicating the stolen GitHub credentials are being used to push malicious commits to repositories.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Apple Exec Shuts Down Rumors Of Ads On Apple TV – BGR Apple Exec Shuts Down Rumors Of Ads On Apple TV – BGR
Next Article XPENG’s new humanoid robot has breasts. Here’s why. XPENG’s new humanoid robot has breasts. Here’s why.
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Super Bowl LX: Here Are the AI-Related Ads Coming to the Big Game
Super Bowl LX: Here Are the AI-Related Ads Coming to the Big Game
News
AI materials startup Polaron raises £6m – UKTN
AI materials startup Polaron raises £6m – UKTN
News
Carrefour has this huge 98-inch Samsung TV at an outlet price with which you won’t miss going to the movies
Carrefour has this huge 98-inch Samsung TV at an outlet price with which you won’t miss going to the movies
Mobile
What is this new contract that is pushing you to leave your current job?
What is this new contract that is pushing you to leave your current job?
Mobile

You Might also Like

Sprout Social vs Hootsuite: Tested & Compared
Computing

Sprout Social vs Hootsuite: Tested & Compared

11 Min Read
Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers
Computing

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

3 Min Read
Starbucks sells majority stake in China business to Boyu Capital in US billion deal · TechNode
Computing

Starbucks sells majority stake in China business to Boyu Capital in US$4 billion deal · TechNode

1 Min Read
China becomes first country to ban hidden car door handles · TechNode
Computing

China becomes first country to ban hidden car door handles · TechNode

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?