Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New GlassWorm Using Invisible Code Hits Attacking VS Code Extensions on OpenVSX Marketplace

Posted on October 22, 2025October 22, 2025 By CWS

Over the previous week, cybersecurity professionals have been gripped by the emergence of GlassWorm, a extremely refined, self-propagating malware marketing campaign concentrating on VS Code extensions on the OpenVSX Market.

The size and technical complexity of this assault sign a turning level for provide chain safety in developer ecosystems.

As of October 2025, over 35,800 installations have reportedly been compromised, with the quantity rising as energetic malicious extensions proceed to function within the wild.

The affect is felt not solely by means of direct credential theft but in addition by means of deep infiltration of developer machines.

The preliminary indicators of the marketing campaign surfaced when Koi researchers recognized uncommon behavioral shifts within the seemingly benign “CodeJoy” extension after its 1.8.3 model replace.

Whereas the extension handed preliminary visible code critiques, Koi’s threat engine flagged it for anomalous community connections and credential entry.

Undetectable on superficial inspection, the researchers shortly discovered that the underlying an infection vector was each novel and alarming—the malicious code was encoded utilizing invisible Unicode characters, permitting it to mix completely with authentic supply information.

The outcome: total blocks of JavaScript payload remained unseen to the bare eye and undetectable by most static evaluation instruments.

CodeJoy threat report on Koidex (Supply – Koi)

Koi’s investigation quickly revealed the magnitude of the risk. The worm harvests secrets and techniques from npm, GitHub, OpenVSX, and even targets 49 completely different cryptocurrency pockets extensions.

After siphoning credentials, it leverages them to hijack further extensions, thereby reaching a self-propagating cycle.

Victims’ units are then weaponized, serving as felony proxy nodes or platforms for distant assaults, illustrating a very distributed and resilient marketing campaign technique.

Koi analysts confirmed that the attackers architected an unkillable command-and-control (C2) infrastructure utilizing the Solana blockchain.

Alongside blockchain payload distribution, fallback C2 mechanisms—Google Calendar occasions and direct IP endpoints—make takedown efforts nearly futile.

Every communication comprises encrypted directions for additional phases, enabling dynamic updates to the malware in close to real-time.

This method permits GlassWorm to adapt swiftly and persistently inside compromised networks.

Invisible Unicode: The An infection Mechanism

A standout side of GlassWorm’s operation is its use of the Unicode “variation selector” exploit. By inserting non-rendering Unicode codepoints into JavaScript supply information, the malware hides total logic branches.

These characters are ignored by visible editors and code overview platforms however are acknowledged and executed by the JavaScript interpreter.

For example, a section within the compromised CodeJoy file confirmed an enormous empty area—really stuffed with practical malicious code—efficiently disguised.

// Line 2 seems empty however comprises:
operate stealCreds() {…}

This technique essentially breaks assumptions of code transparency. Builders, even when manually inspecting diffs or reviewing GitHub commits, can’t see the injected logic.

Solely byte-wise or deeply specialised instruments can reveal the hidden payload, underscoring the criticality of updating code inspection and CI processes to detect non-standard Unicode—a mitigation precedence for defenders.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacking, Code, Extensions, GlassWorm, Hits, Invisible, Marketplace, OpenVSX

Post navigation

Previous Post: Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025
Next Post: Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware

Related Posts

APT SideWinder Actor Profile – Recent Attacks, Tactics, Techniques, and Procedures Cyber Security News
Agentless Access, Sensitive Data Masking, and Smooth Session Playback Cyber Security News
New Inboxfuscation Tool That Bypasses Microsoft Exchange Inbox Rules and Evade Detection Cyber Security News
Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System Cyber Security News
VMware Cloud Foundation 9.0 Released With Modern Workloads & AI Services Cyber Security News
Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Keycard Emerges From Stealth Mode With $38 Million in Funding
  • Bridging the Remediation Gap: Introducing Pentera Resolve
  • What Makes a Great Field CXO: Lessons from the Front Lines
  • Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams
  • Oracle Releases October 2025 Patches

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Keycard Emerges From Stealth Mode With $38 Million in Funding
  • Bridging the Remediation Gap: Introducing Pentera Resolve
  • What Makes a Great Field CXO: Lessons from the Front Lines
  • Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams
  • Oracle Releases October 2025 Patches

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News