Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Why so many people get hacked by government spyware

Understanding the UK’s eternal chemical problem

6Sense founder Amanda Carlow raises $30 million for new human-replacement AI sales startup 1Mind

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » GlassWorm malware found in three VS Code extensions that were installed thousands of times
Identity

GlassWorm malware found in three VS Code extensions that were installed thousands of times

userBy userNovember 10, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 10, 2025Ravi LakshmananMalware/Threat Intelligence

Cybersecurity researchers have published a new set of three extensions related to the GlassWorm campaign. This marks an ongoing attempt by some threat actors to target the Visual Studio Code (VS Code) ecosystem.

The extension in question is still available for download and is listed below.

DFIR retainer service

GlassWorm, first documented by Koi Security late last month, refers to a campaign in which attackers leveraged the Open VSX registry and VS Code extensions from the Microsoft Extension Marketplace to harvest Open VSX, GitHub, and Git credentials, exfiltrate funds from 49 different cryptocurrency wallet extensions, and drop additional tools for remote access.

What’s notable about this malware is that it uses invisible Unicode characters to hide its malicious code in the code editor, and exploits stolen credentials to compromise additional extensions, effectively creating a self-replicating cycle that can further expand its reach and spread in a worm-like manner.

In response to the findings, Open VSX announced that as of October 21, 2025, it has identified and removed all malicious extensions and rotated or revoked the associated tokens. However, a new report from Koi Security shows that this threat has resurfaced again, using the same invisible Unicode character obfuscation trick to evade detection.

“The attacker posted a new transaction to the Solana blockchain and provided an updated C2 [command-and-control] It is an endpoint for downloading the next stage payload,” said security researchers Idan Dardikman, Yuval Ronen, and Lotan Sery.

“This shows the resilience of blockchain-based C2 infrastructure. Even if the payload server goes down, an attacker can post a new transaction for as little as a penny, and all infected machines automatically get a new location.”

The security vendor also revealed that it had identified endpoints that were allegedly accidentally exposed on the attacker’s servers, and revealed a partial list of victims across the United States, South America, Europe, and Asia. This includes major government agencies in the Middle East.

CIS build kit

Further analysis revealed keylogger information that appears to be from the attacker’s own machine, providing some clues as to GlassWorm’s origins. The attacker is believed to be Russian-speaking and is said to be using an open-source browser extension C2 framework named RedExt as part of its infrastructure.

“These may be real organizations or real people whose credentials have been collected, whose machines may be acting as a criminal proxy infrastructure, and whose internal networks may have already been compromised,” Koi Security said.

This development comes shortly after Aikido Security published research showing that GlassWorm has expanded its targeting to GitHub and that stolen GitHub credentials are being used to push malicious commits to repositories.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSpace dust could be key to monitoring changes in Arctic sea ice
Next Article Massive ClickFix phishing attack using PureRAT malware targets hotel systems
user
  • Website

Related Posts

Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

November 10, 2025

New Browser Security Report Reveals New Threats to Enterprises

November 10, 2025

Massive ClickFix phishing attack using PureRAT malware targets hotel systems

November 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Why so many people get hacked by government spyware

Understanding the UK’s eternal chemical problem

6Sense founder Amanda Carlow raises $30 million for new human-replacement AI sales startup 1Mind

Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.