Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fake VS Code Extensions Spread GlassWorm v2 Malware

Fake VS Code Extensions Spread GlassWorm v2 Malware

Posted on April 27, 2026 By CWS

Cybersecurity experts have recently identified a significant threat involving fake Microsoft Visual Studio Code (VS Code) extensions, revealing a new wave of malware known as GlassWorm v2. A total of 73 extensions, discovered on the Open VSX repository, are linked to this information-stealing campaign.

Malicious Extensions Disguised as Legitimate Tools

Among these 73 extensions, six have been confirmed as harmful, while the remainder initially appear benign to gain user trust. These extensions mimic legitimate versions to deceive developers into installing them. This tactic, termed “visual trust,” leverages familiar icons and descriptions to increase downloads before executing their malicious intent.

The extensions were first published earlier this month, according to Socket, a security firm tracking the evolution of GlassWorm v2. Since its discovery in December 2025, over 320 artifacts have been associated with this campaign. Some of the identified malicious extensions include outsidestormcommand.monochromator-theme and keyacrosslaud.auto-loop-for-antigravity.

Advanced Evasion Techniques

Threat actors are refining their strategies, utilizing sleeper packages and transitive dependencies to avoid detection. Additionally, they employ Zig-based droppers to deploy secondary VSIX extensions from GitHub, capable of infecting various integrated development environments (IDEs) on a developer’s machine.

The strategy involves using seemingly harmless extensions as loaders to fetch and install the actual payload from GitHub. This payload, a VSIX extension, is deployed across IDEs like VS Code, Cursor, Windsurf, and VSCodium, using the “–install-extension” command.

Ultimate Goal: Data Theft and System Compromise

The primary objective of these malicious activities is to execute malware that bypasses Russian systems, exfiltrate sensitive data, and install remote access trojans (RATs). Furthermore, it stealthily deploys rogue Chromium-based extensions designed to capture credentials, bookmarks, and other personal information.

This approach, while maintaining the same end result as previous binary-based methods, uses obfuscated JavaScript to keep the delivery mechanism less detectable. The extension functions as a loader, with the payload activated post-installation.

As these threats continue to develop, it is crucial for developers and organizations to remain vigilant and implement robust security measures to protect their systems from such sophisticated attacks.

The Hacker News Tags:Cybersecurity, developer tools, GlassWorm v2, information stealing, malicious extensions, Malware, social engineering, Software Security, software supply chain, VS Code

Post navigation

Previous Post: Malware Campaign Evades Detection with Advanced Techniques
Next Post: Itron Investigates Cyber Breach Affecting Systems

Related Posts

Meta to End Instagram Encrypted Chats by May 2026 Meta to End Instagram Encrypted Chats by May 2026 The Hacker News
Critical n8n Vulnerability Allows System Commands Execution Critical n8n Vulnerability Allows System Commands Execution The Hacker News
New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer The Hacker News
Cisco Highlights Exploitation of Catalyst SD-WAN Vulnerabilities Cisco Highlights Exploitation of Catalyst SD-WAN Vulnerabilities The Hacker News
NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers The Hacker News
New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Fast16 Malware Uncovered: Cybersecurity Concerns Rise
  • Notepad++ Flaw Poses Security Risk for Developers
  • Critical Linux Flaw ‘Pack2TheRoot’ Grants Root Access
  • Checkmarx Data Breach: GitHub Data Exposed on Dark Web
  • Security Alert: macOS textutil and KeePassXC Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Fast16 Malware Uncovered: Cybersecurity Concerns Rise
  • Notepad++ Flaw Poses Security Risk for Developers
  • Critical Linux Flaw ‘Pack2TheRoot’ Grants Root Access
  • Checkmarx Data Breach: GitHub Data Exposed on Dark Web
  • Security Alert: macOS textutil and KeePassXC Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark