Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fake VS Code Extensions Spread GlassWorm v2 Malware

Fake VS Code Extensions Spread GlassWorm v2 Malware

Posted on April 27, 2026 By CWS

Cybersecurity experts have recently identified a significant threat involving fake Microsoft Visual Studio Code (VS Code) extensions, revealing a new wave of malware known as GlassWorm v2. A total of 73 extensions, discovered on the Open VSX repository, are linked to this information-stealing campaign.

Malicious Extensions Disguised as Legitimate Tools

Among these 73 extensions, six have been confirmed as harmful, while the remainder initially appear benign to gain user trust. These extensions mimic legitimate versions to deceive developers into installing them. This tactic, termed “visual trust,” leverages familiar icons and descriptions to increase downloads before executing their malicious intent.

The extensions were first published earlier this month, according to Socket, a security firm tracking the evolution of GlassWorm v2. Since its discovery in December 2025, over 320 artifacts have been associated with this campaign. Some of the identified malicious extensions include outsidestormcommand.monochromator-theme and keyacrosslaud.auto-loop-for-antigravity.

Advanced Evasion Techniques

Threat actors are refining their strategies, utilizing sleeper packages and transitive dependencies to avoid detection. Additionally, they employ Zig-based droppers to deploy secondary VSIX extensions from GitHub, capable of infecting various integrated development environments (IDEs) on a developer’s machine.

The strategy involves using seemingly harmless extensions as loaders to fetch and install the actual payload from GitHub. This payload, a VSIX extension, is deployed across IDEs like VS Code, Cursor, Windsurf, and VSCodium, using the “–install-extension” command.

Ultimate Goal: Data Theft and System Compromise

The primary objective of these malicious activities is to execute malware that bypasses Russian systems, exfiltrate sensitive data, and install remote access trojans (RATs). Furthermore, it stealthily deploys rogue Chromium-based extensions designed to capture credentials, bookmarks, and other personal information.

This approach, while maintaining the same end result as previous binary-based methods, uses obfuscated JavaScript to keep the delivery mechanism less detectable. The extension functions as a loader, with the payload activated post-installation.

As these threats continue to develop, it is crucial for developers and organizations to remain vigilant and implement robust security measures to protect their systems from such sophisticated attacks.

The Hacker News Tags:Cybersecurity, developer tools, GlassWorm v2, information stealing, malicious extensions, Malware, social engineering, Software Security, software supply chain, VS Code

Post navigation

Previous Post: Malware Campaign Evades Detection with Advanced Techniques
Next Post: Itron Investigates Cyber Breach Affecting Systems

Related Posts

0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves The Hacker News
New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP The Hacker News
Step Into the Password Graveyard… If You Dare (and Join the Live Session) Step Into the Password Graveyard… If You Dare (and Join the Live Session) The Hacker News
AI Enhances Security Testing in Dynamic Environments AI Enhances Security Testing in Dynamic Environments The Hacker News
PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads The Hacker News
Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Linux Flaw ‘Pack2TheRoot’ Grants Root Access
  • Checkmarx Data Breach: GitHub Data Exposed on Dark Web
  • Security Alert: macOS textutil and KeePassXC Risks
  • Itron Investigates Cyber Breach Affecting Systems
  • Fake VS Code Extensions Spread GlassWorm v2 Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Linux Flaw ‘Pack2TheRoot’ Grants Root Access
  • Checkmarx Data Breach: GitHub Data Exposed on Dark Web
  • Security Alert: macOS textutil and KeePassXC Risks
  • Itron Investigates Cyber Breach Affecting Systems
  • Fake VS Code Extensions Spread GlassWorm v2 Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark