Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

France ditches Windows for Linux to reduce dependence on US technology

GlassWorm campaign uses Zig Dropper to infect multiple developer IDEs

PoET telescope makes first observation in exoplanet research

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » GlassWorm campaign uses Zig Dropper to infect multiple developer IDEs
Identity

GlassWorm campaign uses Zig Dropper to infect multiple developer IDEs

By April 10, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rabi LakshmananApril 10, 2026Malware/Blockchain

Cybersecurity researchers have warned of further evolution of the ongoing GlassWorm campaign. It employs a new Zig dropper designed to covertly infect all integrated development environments (IDEs) on a developer’s machine.

The technique was discovered in an Open VSX extension named “specstudio.code-wakatime-activity-tracker” that pretends to be WakaTime, a popular tool that measures the time programmers spend inside IDEs. This extension is no longer available for download.

“Extension […] ships Zig-compiled native binaries along with JavaScript code,” Aikido security researcher Ilyas Makari said in an analysis published this week.

“This is not the first time GlassWorm has resorted to using native compiled code in an extension. However, rather than using the binary directly as a payload, it is used as a stealth indirection of the known GlassWorm dropper, which secretly infects all other IDEs it can detect on the system.”

The newly identified Microsoft Visual Studio Code (VS Code) extension is a near-replica of WakaTime, with the exception of changes introduced to a function named “activate().” This extension installs a binary named “win.node” on Windows systems, and a universal Mach-O binary “mac.node” if the system is running Apple macOS.

These Node.js native add-ons are compiled shared libraries written in Zig that are loaded directly into Node’s runtime and run outside of the JavaScript sandbox with full operating system-level access.

The main purpose of the loaded binaries is to find all IDEs on your system that support VS Code extensions. This includes Microsoft VS Code and VS Code Insiders, as well as forks like VSCodium and Positron, and a number of artificial intelligence (AI)-powered coding tools like Cursor and Windsurf.

The binary then downloads a malicious VS Code extension (.VSIX) from an attacker-controlled GitHub account. The extension, called ‘floktokbok.autoimport’, masquerades as the legitimate extension ‘steoates.autoimport’, which has been installed over 5 million times on the official Visual Studio Marketplace.

In the final step, the downloaded .VSIX file is written to a temporary path and installed silently on all IDEs using each editor’s CLI installer. The second stage VS Code extension acts as a dropper to avoid execution on Russian systems, communicating with the Solana blockchain to obtain a command and control (C2) server, exfiltrating sensitive data, installing a remote access trojan (RAT), and finally deploying a Google Chrome extension that steals information.

Users who have installed “specstudio.code-wakatime-activity-tracker” or “floktokbok.autoimport” are advised to rotate all secrets in case of a compromise.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePoET telescope makes first observation in exoplanet research
Next Article France ditches Windows for Linux to reduce dependence on US technology

Related Posts

Browser extensions are the new AI consumption channel no one is talking about

April 10, 2026

Google deploys DBSC in Chrome 146 to block session theft on Windows

April 10, 2026

Marimo RCE flaw CVE-2026-39987 exploited within 10 hours of publication

April 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

France ditches Windows for Linux to reduce dependence on US technology

GlassWorm campaign uses Zig Dropper to infect multiple developer IDEs

PoET telescope makes first observation in exoplanet research

Artemis II returns live: NASA prepares for Artemis II crew’s dangerous return to Earth at record-breaking speed

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.