Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Supply Chain Attack Targets VS Code Extensions With ‘GlassWorm’ Malware

Posted on October 21, 2025October 21, 2025 By CWS

Visible Studio builders are focused with a self-propagating worm in a classy provide chain assault by way of the OpenVSX market, Koi Safety experiences.

Dubbed GlassWorm, the malware was designed to steal delicate data from the victims’ machines, together with NPM, GitHub, and Git credentials, and to empty funds from 49 cryptocurrency extensions.

Moreover, it deploys SOCKS proxy servers on the contaminated machines, installs hidden VNC servers to offer attackers with distant entry to programs, and spreads itself by compromising packages and extensions utilizing the stolen credentials.

What makes the worm stand out, Koi Safety notes, is its use of Unicode variation selectors, which don’t produce visible output, hiding the code in code editors to make it invisible to the human eye.

“To a developer doing code evaluate, it appears like clean traces or whitespace. To static evaluation instruments scanning for suspicious code, it appears like nothing in any respect. However to the JavaScript interpreter? It’s executable code,” Koi explains.

GlassWorm makes use of the Solana blockchain for command-and-control (C&C) infrastructure: it searches the blockchain for particular transactions that comprise of their memo discipline directions concerning the situation of the next-stage payload.

This ensures that the infrastructure will not be disrupted, as these transactions can’t be modified or deleted from the blockchain, and gives the attackers with anonymity. Moreover, the attackers can simply change the payload or its location by merely publishing a brand new transaction for the malware to learn.

“You’re taking part in whack-a-mole with an opponent who has infinite moles. This isn’t some theoretical assault vector. This can be a real-world, production-ready C&C infrastructure that’s actively serving malware proper now. And there’s actually no technique to take it down,” Koi notes.Commercial. Scroll to proceed studying.

Moreover, the malware makes use of Google Calendar as a backup C&C, from which it fetches one other payload to show the contaminated programs into nodes within the attacker’s infrastructure, by deploying a SOCKS proxy server, WebRTC modules for peer-to-peer communication, and hidden VNC for distant management.

In line with Koi, the assault began on October 17, when seven VS Code extensions on OpenVSX had been compromised. Given the malware’s self-propagating capabilities, extra extensions had been compromised after the contaminated packages had been put in by customers.

On October 18, after two of the initially compromised builders printed clear variations of their packages, Koi was seeing 10 extensions nonetheless delivering the malware. One other one was recognized the following day, in Microsoft’s VS Code market.

“The attacker’s C&C infrastructure is absolutely operational – payload servers are responding, and stolen credentials are getting used to compromise extra packages,” Koi warned over the weekend.

In line with Koi, the contaminated extensions have been put in over 35,800 instances. Provided that VS Code extensions auto-update, the compromised packages contaminated all builders that had them put in, with out consumer interplay.

Associated: GitHub Boosting Safety in Response to NPM Provide Chain Assaults

Associated: Shai-Hulud Provide Chain Assault: Worm Used to Steal Secrets and techniques, 180+ NPM Packages Hit

Associated: Extremely Common NPM Packages Poisoned in New Provide Chain Assault

Associated: Over 6,700 Non-public Repositories Made Public in Nx Provide Chain Assault

Security Week News Tags:Attack, Chain, Code, Extensions, GlassWorm, Malware, Supply, Targets

Post navigation

Previous Post: Securing AI to Benefit from AI
Next Post: 131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store

Related Posts

Salesloft GitHub Account Compromised Months Before Salesforce Attack Security Week News
DDoS Attacks Blocked by Cloudflare in 2025 Already Surpass 2024 Total  Security Week News
Four-Year Prison Sentence for PowerSchool Hacker Security Week News
Chinese Silk Typhoon Hackers Exploited Commvault Zero-Day Security Week News
Government, Industrial Servers Targeted in China-Linked ‘PassiveNeuron’ Campaign Security Week News
Critical Flaw Allows Remote Hacking of AutomationDirect Industrial Gateway Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cavalry Werewolf APT Hackers Attacking Multiple Industries With FoalShell and StallionRAT
  • Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework
  • Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’
  • How Threat Intelligence Can Save Money and Resources for Businesses
  • Microsoft Confirms Recent Updates Cause Login Issues on Windows 11 24H2, 25H2, and Windows Server 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cavalry Werewolf APT Hackers Attacking Multiple Industries With FoalShell and StallionRAT
  • Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework
  • Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’
  • How Threat Intelligence Can Save Money and Resources for Businesses
  • Microsoft Confirms Recent Updates Cause Login Issues on Windows 11 24H2, 25H2, and Windows Server 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News