GlassWorm Malware Found in Risky VS Code Add-ons

Introduction to the Expanding Threat

GlassWorm malware continues to evolve and now hides inside three new VS Code extensions. Researchers say the add-ons remain available for download, which increases the risk for thousands of developers. Therefore, the campaign shows no signs of slowing. However, many users still do not realize their tools may be compromised.

These extensions include three separate packages with several thousand combined installs. They appear harmless at first. However, they secretly collect sensitive credentials from major development platforms.

How the GlassWorm Campaign Operates

GlassWorm first came to light in a report last month. Threat actors use VS Code extensions to steal login details from development services. They also drain cryptocurrency wallets by targeting dozens of wallet extensions. Therefore, the attack chain threatens both developers and investors.

The malware also deploys additional tools that allow remote access. It then abuses stolen credentials to upload more infected extensions. This creates a self-spreading cycle similar to a worm. As a result, its reach grows quickly across marketplaces.

Hidden Code and Obfuscation Techniques

GlassWorm uses invisible Unicode characters to disguise malicious code. These characters blend into normal files. Therefore, detection becomes extremely difficult for typical security scanners.

The same trick helped attackers revive the campaign even after previous removals. A recent report shows the threat has resurfaced. It again bypasses filters with the same hidden characters, which signals ongoing attacker sophistication.

Blockchain-Based Control Infrastructure

Researchers discovered that the attacker posted a new blockchain transaction with an updated command-and-control address. This technique allows infected machines to fetch new payload locations automatically. Therefore, the attacker can recover quickly after disruptions. However, this also makes takedowns harder for defenders.

Blockchain-based control costs very little. For example, attackers can publish new instructions for only a fraction of a cent. This efficiency helps them sustain long-term operations.

Evidence of Global Victims

An exposed server revealed partial victim data. It includes organizations from the U.S., South America, Europe, and Asia. Therefore, the campaign has global impact. One affected target even includes a government entity from the Middle East.

Researchers also found keylogger logs from the attacker’s own device. These clues suggest the threat actor speaks Russian and uses an open-source browser framework for command-and-control support.

Growing Threat to Developer Platforms

A recent report revealed that GlassWorm now targets GitHub users through stolen credentials. Attackers then push malicious commits to repositories. Therefore, compromised developer accounts can spread harmful code to entire teams. This expansion shows that GlassWorm aims to infiltrate the broader software ecosystem.

How to Prevent These Attacks

Developers and organizations should enforce strict extension reviews and remove tools they do not trust. They should also use protective services that provide threat monitoring and proactive attack detection. In addition, continuous scanning of developer environments can block hidden scripts and catch suspicious credential use before major damage occurs.

Sleep well, we got you covered.

Scroll to Top