GlassWorm Malware Targets VS Code with New Malicious Extensions

GlassWorm Campaign: Malicious VS Code Extensions Use Unicode Obfuscation, Blockchain C2, and Credential Theft to Target Global Organizations

  • Three malicious Visual Studio Code extensions linked to the GlassWorm campaign remain available for download.
  • GlassWorm uses invisible Unicode characters to hide malicious code and spreads by stealing developer credentials.
  • Attackers exploit blockchain-based command-and-control infrastructure for resilience against takedowns.
  • A partial victim list includes global organizations, including a major Middle Eastern government entity.
  • The threat actor is identified as Russian-speaking and uses an open-source browser extension framework named RedExt.

Cybersecurity experts have revealed that three harmful extensions tied to the GlassWorm campaign targeting the Visual Studio Code (VS Code) environment are still accessible for download. The discovery underscores ongoing efforts by threat actors to infiltrate the VS Code ecosystem. Details of these extensions can be found in the linked Malware-expose-attacker-infrastructure”>report.

- Advertisement -

GlassWorm first emerged late last month and operates by exploiting VS Code extensions from the Open VSX Registry and Microsoft Extension Marketplace. The campaign steals credentials from Open VSX, GitHub, and Git, drains funds from 49 cryptocurrency wallet extensions, and deploys additional remote access tools. It notably hides malicious code using invisible Unicode characters within code editors, a method aiding in evasion.

After Open VSX removed all malicious extensions and rotated tokens on October 21, 2025, research from Koi Security shows the attack resurfaced with the same obfuscation technique. Security researchers Idan Dardikman, Yuval Ronen, and Lotan Sery stated, “The attacker has posted a fresh transaction to the Solana Blockchain, providing an updated C2 [command-and-control] endpoint for downloading the next-stage payload.” They added that blockchain-based command systems allow attackers to update payload locations cheaply and reliably, ensuring infected systems automatically fetch new server addresses.

Further investigation uncovered an exposed endpoint on the attacker’s server, revealing a partial list of victims across the U.S., South America, Europe, and Asia. The list notably includes a major government entity based in the Middle East. Keylogger data from the attacker’s own machine indicates the threat actor likely speaks Russian and employs an open-source browser extension C2 platform called RedExt.

Additional findings from Aikido Security reveal GlassWorm has expanded to target GitHub repositories, using stolen credentials to introduce malicious code commits. This ongoing campaign poses risks to real organizations and individuals whose systems and credentials may have been compromised.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Australian Sells Spy Tools to Russia for $1.26M in Crypto

Australian executive Peter Williams pleaded guilty to stealing and selling sensitive cyber tools to...

AI Costs Stymie Workforce Takeover, Investors Say

Top tech investors reveal AI agent operational costs can hit $300 daily, equating to...

White House Seeks Path for Stablecoin Rewards in Key Bill

U.S. officials met with banks and crypto groups at the White House to discuss...

Bitcoin Options Flash Fear Amid $66K Support Struggle

Professional traders are paying a 13% premium for downside protection on Bitcoin.Options data shows...

Walmart Ticks Up on Beat, Shares Cautious Outlook

Walmart narrowly topped Q4 profit estimates but issued a more guarded forecast for 2026...

Must Read

9 Best Trading Platforms for Crypto Beginners

Many newcomers to the crypto space are looking for platforms to buy, sell and exchange cryptocurrencies. While there are hundreds of crypto exchanges around...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!