Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Checkmarx confirms GitHub repository data posted to dark web after March 23rd attack

China blocks Meta’s $2 billion Manas deal after months of investigation

OpenAI could create phones that replace apps with AI agents

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers discover 73 fake VS Code extensions delivering GlassWorm v2 malware
Identity

Researchers discover 73 fake VS Code extensions delivering GlassWorm v2 malware

By April 27, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananApril 27, 2026Malware/Software Supply Chain

Cybersecurity researchers have reported that dozens of Microsoft Visual Studio Code (VS Code) extensions on the Open VSX repository have been linked to a persistent information theft campaign called GlassWorm.

A cluster of 73 extensions has been confirmed to be cloned versions of legitimate extensions. Six of these are confirmed to be malicious, while the rest act as seemingly benign sleeper packages that trick users into downloading and building trust, with subsequent updates sometimes revealing their true intentions.

According to application security company Socket, all extensions were rolled out at the beginning of the month, with the latest iteration being tracked under the name GlassWorm v2. In total, over 320 artifacts were identified since December 21, 2025. Below is a list of extensions that have been identified as malicious.

Outsidestormcommand.monochromator-theme keyacrosslaud.auto-loop-for-antigravity krundoven.ironplc-fast-hub boulderzitunnel.vscode-buddies cubedivervolt.html-code-validate awarddomain17.version-lens-tool

In addition to typosquatting the names of the original packages (CEINTL.vscode-language-pack-tr and Emotionkyo Separate.turkish-language-pack), the cloned sleepers use the same icons and descriptions as their legitimate counterparts to trick unsuspecting developers into installing the extension.

This “visual trust” acts as an effective social engineering tactic to organically increase install numbers before being contaminated to provide malware to downstream users.

This disclosure comes as the attackers behind the campaign are actively evolving their techniques, focusing on sleeper packages and transitive dependencies to evade detection, while also using Zig-based droppers to deploy secondary VSIX extensions hosted on GitHub that can potentially infect all integrated development environments (IDEs) on a developer’s machine.

The extension identified by Socket acts as a benign loader for the actual payload. This is a VSIX extension retrieved from GitHub that is installed on all identified IDEs in your system, including VS Code, Cursor, Windsurf, and VSCodium, using the “–install-extension” command.

Regardless of the method used, the end goal is the same. It runs malware that evades Russian systems, steals sensitive data, installs remote access Trojans (RATs), and secretly deploys rogue Chromium-based extensions that siphon credentials, bookmarks, and other information.

“This approach achieves the same results as binary-based variants, but the delivery logic is kept in obfuscated JavaScript,” the company said. “The extension acts as a loader, and after activation, the payload is retrieved and executed.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMetaink uses solar power from space at night
Next Article PhantomCore exploits TrueConf vulnerability to infiltrate Russian networks

Related Posts

Checkmarx confirms GitHub repository data posted to dark web after March 23rd attack

April 27, 2026

Myths have changed the calculus of vulnerability discovery. Most teams are not ready on the repair side.

April 27, 2026

PhantomCore exploits TrueConf vulnerability to infiltrate Russian networks

April 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Checkmarx confirms GitHub repository data posted to dark web after March 23rd attack

China blocks Meta’s $2 billion Manas deal after months of investigation

OpenAI could create phones that replace apps with AI agents

Myths have changed the calculus of vulnerability discovery. Most teams are not ready on the repair side.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.