By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs
Computing

GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs

News Room
Last updated: 2025/11/10 at 4:52 AM
News Room Published 10 November 2025
Share
GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs
SHARE

Nov 10, 2025Ravie LakshmananMalware / Threat Intelligence

Cybersecurity researchers have disclosed a new set of three extensions associated with the GlassWorm campaign, indicating continued attempts on part of threat actors to target the Visual Studio Code (VS Code) ecosystem.

The extensions in question, which are still available for download, are listed below –

DFIR Retainer Services

GlassWorm, first documented by Koi Security late last month, refers to a campaign in which threat actors leverage VS Code extensions on the Open VSX Registry and the Microsoft Extension Marketplace to harvest Open VSX, GitHub, and Git credentials, drain funds from 49 different cryptocurrency wallet extensions, and drop additional tools for remote access.

What makes the malware notable is that it uses invisible Unicode characters to hide malicious code in code editors and abuses the pilfered credentials to compromise additional extensions and further extend its reach, effectively creating a self-replication cycle that allows it to spread in a worm-like fashion.

In response to the findings, Open VSX said it identified and removed all malicious extensions, in addition to rotating or revoking associated tokens as of October 21, 2025. However, the latest report from Koi Security shows that the threat has resurfaced a second time, using the same invisible Unicode character obfuscation trick to bypass detection.

“The attacker has posted a fresh transaction to the Solana blockchain, providing an updated C2 [command-and-control] endpoint for downloading the next-stage payload,” security researchers Idan Dardikman, Yuval Ronen, and Lotan Sery said.

“This demonstrates the resilience of blockchain-based C2 infrastructure – even if payload servers are taken down, the attacker can post a new transaction for a fraction of a cent, and all infected machines automatically fetch the new location.”

The security vendor also revealed it identified an endpoint that’s said to have been inadvertently exposed on the attacker’s server, uncovering a partial list of victims spanning the U.S., South America, Europe, and Asia. This includes a major government entity from the Middle East.

CIS Build Kits

Further analysis has uncovered keylogger information supposedly from the attacker’s own machine, which has yielded some clues as to GlassWorm’s provenance. The threat actor is assessed to be Russian-speaking and is said to use an open-source browser extension C2 framework named RedExt as part of their infrastructure.

“These are real organizations and real people whose credentials have been harvested, whose machines may be serving as criminal proxy infrastructure, whose internal networks may already be compromised,” Koi Security said.

The development comes shortly after Aikido Security published findings showing that GlassWorm has expanded its focus to target GitHub, indicating the stolen GitHub credentials are being used to push malicious commits to repositories.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Apple Exec Shuts Down Rumors Of Ads On Apple TV – BGR Apple Exec Shuts Down Rumors Of Ads On Apple TV – BGR
Next Article XPENG’s new humanoid robot has breasts. Here’s why. XPENG’s new humanoid robot has breasts. Here’s why.
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The OnePlus 12 has started getting Android 16…sort of
Gadget
4 Essential Roku TV Settings And Tips That Can Speed Up Your Device – BGR
4 Essential Roku TV Settings And Tips That Can Speed Up Your Device – BGR
News
Gartner Symposium 2025: The AI opportunity for CIOs | Computer Weekly
Gartner Symposium 2025: The AI opportunity for CIOs | Computer Weekly
News
Why your company (and every company) needs an ‘AI-first’ approach
Why your company (and every company) needs an ‘AI-first’ approach
Software

You Might also Like

Q4 2025 Milestone, V1 Protocol Launch Planned for Mutuum Finance (MUTM) | HackerNoon
Computing

Q4 2025 Milestone, V1 Protocol Launch Planned for Mutuum Finance (MUTM) | HackerNoon

7 Min Read
How to Write Technical Specs That Actually Ship | HackerNoon
Computing

How to Write Technical Specs That Actually Ship | HackerNoon

41 Min Read
Bitcoin.com and Concordium Partner to Enable Privacy-First Age Verification for 75 Million Wallets | HackerNoon
Computing

Bitcoin.com and Concordium Partner to Enable Privacy-First Age Verification for 75 Million Wallets | HackerNoon

10 Min Read
Tencent Proposes Semantics-Aware vCPU Scheduling For Over-Subscribed KVM Linux VMs
Computing

Tencent Proposes Semantics-Aware vCPU Scheduling For Over-Subscribed KVM Linux VMs

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?