Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New GlassWorm Using Invisible Code Hits Attacking VS Code Extensions on OpenVSX Marketplace

Posted on October 22, 2025October 22, 2025 By CWS

Over the previous week, cybersecurity professionals have been gripped by the emergence of GlassWorm, a extremely refined, self-propagating malware marketing campaign concentrating on VS Code extensions on the OpenVSX Market.

The size and technical complexity of this assault sign a turning level for provide chain safety in developer ecosystems.

As of October 2025, over 35,800 installations have reportedly been compromised, with the quantity rising as energetic malicious extensions proceed to function within the wild.

The affect is felt not solely by means of direct credential theft but in addition by means of deep infiltration of developer machines.

The preliminary indicators of the marketing campaign surfaced when Koi researchers recognized uncommon behavioral shifts within the seemingly benign “CodeJoy” extension after its 1.8.3 model replace.

Whereas the extension handed preliminary visible code critiques, Koi’s threat engine flagged it for anomalous community connections and credential entry.

Undetectable on superficial inspection, the researchers shortly discovered that the underlying an infection vector was each novel and alarming—the malicious code was encoded utilizing invisible Unicode characters, permitting it to mix completely with authentic supply information.

The outcome: total blocks of JavaScript payload remained unseen to the bare eye and undetectable by most static evaluation instruments.

CodeJoy threat report on Koidex (Supply – Koi)

Koi’s investigation quickly revealed the magnitude of the risk. The worm harvests secrets and techniques from npm, GitHub, OpenVSX, and even targets 49 completely different cryptocurrency pockets extensions.

After siphoning credentials, it leverages them to hijack further extensions, thereby reaching a self-propagating cycle.

Victims’ units are then weaponized, serving as felony proxy nodes or platforms for distant assaults, illustrating a very distributed and resilient marketing campaign technique.

Koi analysts confirmed that the attackers architected an unkillable command-and-control (C2) infrastructure utilizing the Solana blockchain.

Alongside blockchain payload distribution, fallback C2 mechanisms—Google Calendar occasions and direct IP endpoints—make takedown efforts nearly futile.

Every communication comprises encrypted directions for additional phases, enabling dynamic updates to the malware in close to real-time.

This method permits GlassWorm to adapt swiftly and persistently inside compromised networks.

Invisible Unicode: The An infection Mechanism

A standout side of GlassWorm’s operation is its use of the Unicode “variation selector” exploit. By inserting non-rendering Unicode codepoints into JavaScript supply information, the malware hides total logic branches.

These characters are ignored by visible editors and code overview platforms however are acknowledged and executed by the JavaScript interpreter.

For example, a section within the compromised CodeJoy file confirmed an enormous empty area—really stuffed with practical malicious code—efficiently disguised.

// Line 2 seems empty however comprises:
operate stealCreds() {…}

This technique essentially breaks assumptions of code transparency. Builders, even when manually inspecting diffs or reviewing GitHub commits, can’t see the injected logic.

Solely byte-wise or deeply specialised instruments can reveal the hidden payload, underscoring the criticality of updating code inspection and CI processes to detect non-standard Unicode—a mitigation precedence for defenders.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacking, Code, Extensions, GlassWorm, Hits, Invisible, Marketplace, OpenVSX

Post navigation

Previous Post: ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration
Next Post: Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware

Related Posts

WatchGuard VPN Vulnerability Let Remote Attacker Execute Arbitrary Code Cyber Security News
Tycoon Phishing Kit Employs New Technique to Hide Malicious Links Cyber Security News
Detecting and Remediating Misconfigurations in Cloud Environments Cyber Security News
New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression Cyber Security News
Triple Combo – Kimsuky Hackers Attack Facebook, Email, and Telegram Users Cyber Security News
JLR Confirms Phased Restart of Operations Following Cyber Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters
  • Microsoft Releases Emergency Patch For Windows Server Update Service RCE Vulnerability
  • Pwn2Own WhatsApp Hacker Says Exploit Privately Disclosed to Meta
  • Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories
  • Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters
  • Microsoft Releases Emergency Patch For Windows Server Update Service RCE Vulnerability
  • Pwn2Own WhatsApp Hacker Says Exploit Privately Disclosed to Meta
  • Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories
  • Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News