Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious OpenVSX Extension Infects Multiple Code Editors

Malicious OpenVSX Extension Infects Multiple Code Editors

Posted on April 10, 2026 By CWS

A Trojanized developer extension on the OpenVSX marketplace is covertly distributing a known malware strain, GlassWorm, to several code editors on developers’ systems. This malicious package poses as a legitimate productivity tool, using compiled native binaries to infect editors like VS Code, Cursor, and Windsurf without detection.

Understanding the GlassWorm Threat

GlassWorm first emerged in March 2025, embedding harmful payloads within invisible Unicode characters in npm packages. Over the past year, its impact has expanded, targeting numerous projects on platforms such as GitHub, npm, and VS Code. Previously, the campaign’s most severe attack involved deploying a persistent Remote Access Trojan via a counterfeit Chrome extension to log keystrokes and steal session cookies.

In April 2026, Aikido security analysts, who have been monitoring the GlassWorm campaign, identified a new tactic. The attack was embedded in an OpenVSX extension named code-wakatime-activity-tracker, published by the specstudio account. This extension mimics the genuine WakaTime productivity tool in functionality and appearance.

Technical Details of the Attack

This iteration of GlassWorm utilizes Zig-compiled native binaries, distinguishing it from previous versions. On Windows systems, the extension includes a file named win.node, a PE32+ DLL, while on macOS, it comprises mac.node, a universal Mach-O binary compatible with both Intel and Apple Silicon hardware. These files integrate directly into Node.js’s runtime, bypassing standard sandbox protections to operate with full system access.

The attack extends beyond a single editor. Upon execution, the binary scans the system for compatible IDEs that support VS Code’s extension format, such as VS Code, VS Code Insiders, Cursor, Windsurf, VSCodium, and Positron, and silently installs a malicious extension in each one. Developers using Cursor alongside VS Code may find both environments compromised without any visible alerts.

Mechanism of Multi-IDE Infection

The infection process initiates when a developer installs the code-wakatime-activity-tracker extension. The extension’s activate() function, intended to launch the WakaTime tool, has been subtly modified by the attacker. Before running any legitimate code, the function loads either win.node or mac.node from the bundled ./bin/ directory and calls install(), setting off the infection chain.

Subsequently, the binary contacts an attacker-controlled GitHub Releases page to download a malicious .vsix file named autoimport-2.7.9, resembling the popular steoates.autoimport VS Code extension. This file is stealthily installed across all detected IDEs, then deleted to erase any evidence of its presence.

Protective Measures and Recommendations

Developers should promptly check their IDE extension lists for specstudio/code-wakatime-activity-tracker and floktokbok.autoimport. If found, the system should be considered compromised, and all credentials, API keys, and stored secrets accessible from the environment should be rotated immediately. Any connected code repositories should be examined for signs of tampering, as the attacker had full system access.

Stay informed by following us on Google News, LinkedIn, and X, and set CSN as a preferred source on Google for more updates.

Cyber Security News Tags:Aikido, code editor, Cursor, GlassWorm, IDE security, Malware, OpenVSX, Security, VS Code, Windsurf

Post navigation

Previous Post: Marimo Vulnerability Exploited Quickly After Disclosure
Next Post: MITRE Unveils Comprehensive Fraud Prevention Framework

Related Posts

Greedy Sponge Hackers Attacking Financial Institutions With Modified Version of AllaKore RAT Greedy Sponge Hackers Attacking Financial Institutions With Modified Version of AllaKore RAT Cyber Security News
Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools Cyber Security News
Ransomware Groups Exploit AzCopy for Data Theft Ransomware Groups Exploit AzCopy for Data Theft Cyber Security News
MomentProof Introduces AI-Resilient Asset Protection for AXA MomentProof Introduces AI-Resilient Asset Protection for AXA Cyber Security News
Apache NuttX Vulnerability Let Attackers to Crash Systems Apache NuttX Vulnerability Let Attackers to Crash Systems Cyber Security News
Two U.S. CyberSecurity Pros Plead Guilty for Working as ALPHV/BlackCat Affiliates Two U.S. CyberSecurity Pros Plead Guilty for Working as ALPHV/BlackCat Affiliates Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chrome 147 Fixes 60 Security Flaws, Two Critical
  • AI Extensions: The Emerging Security Threat in Browsers
  • Mallory Unveils AI-Driven Threat Intelligence Platform
  • MITRE Unveils Comprehensive Fraud Prevention Framework
  • Malicious OpenVSX Extension Infects Multiple Code Editors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chrome 147 Fixes 60 Security Flaws, Two Critical
  • AI Extensions: The Emerging Security Threat in Browsers
  • Mallory Unveils AI-Driven Threat Intelligence Platform
  • MITRE Unveils Comprehensive Fraud Prevention Framework
  • Malicious OpenVSX Extension Infects Multiple Code Editors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark