Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Supply Chain Attack Targets VS Code Extensions With ‘GlassWorm’ Malware

Posted on October 21, 2025October 21, 2025 By CWS

Visible Studio builders are focused with a self-propagating worm in a classy provide chain assault by way of the OpenVSX market, Koi Safety experiences.

Dubbed GlassWorm, the malware was designed to steal delicate data from the victims’ machines, together with NPM, GitHub, and Git credentials, and to empty funds from 49 cryptocurrency extensions.

Moreover, it deploys SOCKS proxy servers on the contaminated machines, installs hidden VNC servers to offer attackers with distant entry to programs, and spreads itself by compromising packages and extensions utilizing the stolen credentials.

What makes the worm stand out, Koi Safety notes, is its use of Unicode variation selectors, which don’t produce visible output, hiding the code in code editors to make it invisible to the human eye.

“To a developer doing code evaluate, it appears like clean traces or whitespace. To static evaluation instruments scanning for suspicious code, it appears like nothing in any respect. However to the JavaScript interpreter? It’s executable code,” Koi explains.

GlassWorm makes use of the Solana blockchain for command-and-control (C&C) infrastructure: it searches the blockchain for particular transactions that comprise of their memo discipline directions concerning the situation of the next-stage payload.

This ensures that the infrastructure will not be disrupted, as these transactions can’t be modified or deleted from the blockchain, and gives the attackers with anonymity. Moreover, the attackers can simply change the payload or its location by merely publishing a brand new transaction for the malware to learn.

“You’re taking part in whack-a-mole with an opponent who has infinite moles. This isn’t some theoretical assault vector. This can be a real-world, production-ready C&C infrastructure that’s actively serving malware proper now. And there’s actually no technique to take it down,” Koi notes.Commercial. Scroll to proceed studying.

Moreover, the malware makes use of Google Calendar as a backup C&C, from which it fetches one other payload to show the contaminated programs into nodes within the attacker’s infrastructure, by deploying a SOCKS proxy server, WebRTC modules for peer-to-peer communication, and hidden VNC for distant management.

In line with Koi, the assault began on October 17, when seven VS Code extensions on OpenVSX had been compromised. Given the malware’s self-propagating capabilities, extra extensions had been compromised after the contaminated packages had been put in by customers.

On October 18, after two of the initially compromised builders printed clear variations of their packages, Koi was seeing 10 extensions nonetheless delivering the malware. One other one was recognized the following day, in Microsoft’s VS Code market.

“The attacker’s C&C infrastructure is absolutely operational – payload servers are responding, and stolen credentials are getting used to compromise extra packages,” Koi warned over the weekend.

In line with Koi, the contaminated extensions have been put in over 35,800 instances. Provided that VS Code extensions auto-update, the compromised packages contaminated all builders that had them put in, with out consumer interplay.

Associated: GitHub Boosting Safety in Response to NPM Provide Chain Assaults

Associated: Shai-Hulud Provide Chain Assault: Worm Used to Steal Secrets and techniques, 180+ NPM Packages Hit

Associated: Extremely Common NPM Packages Poisoned in New Provide Chain Assault

Associated: Over 6,700 Non-public Repositories Made Public in Nx Provide Chain Assault

Security Week News Tags:Attack, Chain, Code, Extensions, GlassWorm, Malware, Supply, Targets

Post navigation

Previous Post: Securing AI to Benefit from AI
Next Post: 131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store

Related Posts

Black Hat USA 2025 – Summary of Vendor Announcements (Part 2) Security Week News
CPAP Medical Data Breach Impacts 90,000 People Security Week News
Connex Credit Union Data Breach Impacts 172,000 People Security Week News
Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday Security Week News
Australia’s TPG Telecom Investigating iiNet Hack Security Week News
Malicious Code on Unity Website Skims Information From Hundreds of Customers Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025
  • TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution
  • Threat Actors Compromise Xubuntu Website To Deliver Malicious Windows Executable
  • TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution
  • Chrome V8 JavaScript Engine Vulnerability Let Attackers Execute Remote Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025
  • TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution
  • Threat Actors Compromise Xubuntu Website To Deliver Malicious Windows Executable
  • TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution
  • Chrome V8 JavaScript Engine Vulnerability Let Attackers Execute Remote Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News