Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Supply Chain Attack Targets VS Code Extensions With ‘GlassWorm’ Malware

Supply Chain Attack Targets VS Code Extensions With ‘GlassWorm’ Malware

Posted on October 21, 2025October 21, 2025 By CWS

Visible Studio builders are focused with a self-propagating worm in a classy provide chain assault by way of the OpenVSX market, Koi Safety experiences.

Dubbed GlassWorm, the malware was designed to steal delicate data from the victims’ machines, together with NPM, GitHub, and Git credentials, and to empty funds from 49 cryptocurrency extensions.

Moreover, it deploys SOCKS proxy servers on the contaminated machines, installs hidden VNC servers to offer attackers with distant entry to programs, and spreads itself by compromising packages and extensions utilizing the stolen credentials.

What makes the worm stand out, Koi Safety notes, is its use of Unicode variation selectors, which don’t produce visible output, hiding the code in code editors to make it invisible to the human eye.

“To a developer doing code evaluate, it appears like clean traces or whitespace. To static evaluation instruments scanning for suspicious code, it appears like nothing in any respect. However to the JavaScript interpreter? It’s executable code,” Koi explains.

GlassWorm makes use of the Solana blockchain for command-and-control (C&C) infrastructure: it searches the blockchain for particular transactions that comprise of their memo discipline directions concerning the situation of the next-stage payload.

This ensures that the infrastructure will not be disrupted, as these transactions can’t be modified or deleted from the blockchain, and gives the attackers with anonymity. Moreover, the attackers can simply change the payload or its location by merely publishing a brand new transaction for the malware to learn.

“You’re taking part in whack-a-mole with an opponent who has infinite moles. This isn’t some theoretical assault vector. This can be a real-world, production-ready C&C infrastructure that’s actively serving malware proper now. And there’s actually no technique to take it down,” Koi notes.Commercial. Scroll to proceed studying.

Moreover, the malware makes use of Google Calendar as a backup C&C, from which it fetches one other payload to show the contaminated programs into nodes within the attacker’s infrastructure, by deploying a SOCKS proxy server, WebRTC modules for peer-to-peer communication, and hidden VNC for distant management.

In line with Koi, the assault began on October 17, when seven VS Code extensions on OpenVSX had been compromised. Given the malware’s self-propagating capabilities, extra extensions had been compromised after the contaminated packages had been put in by customers.

On October 18, after two of the initially compromised builders printed clear variations of their packages, Koi was seeing 10 extensions nonetheless delivering the malware. One other one was recognized the following day, in Microsoft’s VS Code market.

“The attacker’s C&C infrastructure is absolutely operational – payload servers are responding, and stolen credentials are getting used to compromise extra packages,” Koi warned over the weekend.

In line with Koi, the contaminated extensions have been put in over 35,800 instances. Provided that VS Code extensions auto-update, the compromised packages contaminated all builders that had them put in, with out consumer interplay.

Associated: GitHub Boosting Safety in Response to NPM Provide Chain Assaults

Associated: Shai-Hulud Provide Chain Assault: Worm Used to Steal Secrets and techniques, 180+ NPM Packages Hit

Associated: Extremely Common NPM Packages Poisoned in New Provide Chain Assault

Associated: Over 6,700 Non-public Repositories Made Public in Nx Provide Chain Assault

Security Week News Tags:Attack, Chain, Code, Extensions, GlassWorm, Malware, Supply, Targets

Post navigation

Previous Post: Securing AI to Benefit from AI
Next Post: 131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store

Related Posts

Coinbase Rejects M Ransom After Rogue Contractors Bribed to Leak Customer Data Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data Security Week News
Hacker Conversations: Rachel Tobac and the Art of Social Engineering Hacker Conversations: Rachel Tobac and the Art of Social Engineering Security Week News
Cato Networks Acquires AI Security Firm Aim Security Cato Networks Acquires AI Security Firm Aim Security Security Week News
Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack Security Week News
Russian APT Switches to New Backdoor After Malware Exposed by Researchers Russian APT Switches to New Backdoor After Malware Exposed by Researchers Security Week News
SBOM Pioneer Allan Friedman Joins NetRise to Advance Supply Chain Visibility SBOM Pioneer Allan Friedman Joins NetRise to Advance Supply Chain Visibility Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News