GlassWorm Worm Targets VS Code Extensions in Major Supply Chain Attack

GlassWorm: A Self-Propagating Worm Infecting Visual Studio Code Extensions Using Solana Blockchain and Google Calendar for Command-and-Control

  • A self-propagating worm called GlassWorm spreads through Visual Studio Code extensions on the Open VSX Registry and Microsoft Extension Marketplace.
  • The attack uses the Solana Blockchain and Google Calendar as command-and-control (C2) methods to avoid takedown.
  • GlassWorm steals developer credentials, compromises cryptocurrency wallets, and installs proxy and remote access tools.
  • The Malware exploits invisible Unicode characters to hide malicious code within extensions downloaded about 35,800 times.
  • GlassWorm autonomously spreads through auto-updating extensions, representing a new type of self-sustaining supply chain attack.

On October 17, 2025, Cybersecurity researchers identified a self-spreading worm named GlassWorm infecting Visual Studio Code (VS Code) extensions available on the Open VSX Registry and Microsoft Extension Marketplace. This malware targets developers by harvesting sensitive credentials and compromising their systems.

- Advertisement -

The infected extensions include 13 on Open VSX and one on Microsoft’s marketplace, which have been downloaded approximately 35,800 times. The names of these extensions cover various utilities such as themes and code viewers. How the attackers took control of these extensions remains unclear.

GlassWorm uses the Solana blockchain to send commands to infected machines. It checks transactions related to an attacker-controlled Solana wallet to retrieve encoded instructions. If this fails, it falls back to Google Calendar events for additional C2 instructions. According to a technical report by Idan Dardikman, the malware employs invisible Unicode variation selector characters that make its code hidden in editors.

The worm collects npm, Open VSX, GitHub, and Git credentials; drains funds from 49 types of cryptocurrency wallet extensions; and sets up SOCKS proxy servers and hidden remote access tools (HVNC) on infected systems. It also installs modules for peer-to-peer communication and decentralized command distribution. The payload called Zombi extends functionality further, turning infections into fully compromised machines.

The auto-update feature of VS Code extensions allows GlassWorm to spread without user interaction. Dardikman described the threat as a worm that can rapidly propagate throughout the developer ecosystem. This incident follows a similar attack, the Shai-Hulud worm, which targeted the npm ecosystem in September 2025.

- Advertisement -

These attacks highlight growing use of blockchain technology by threat actors to avoid detection and takedown. Blockchain provides pseudonymity and flexible communication channels, making it an attractive tool for cybercrime campaigns.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Bitcoin ETF Inflows Hit $506M, Highest Since February

U.S. spot Bitcoin ETF inflows surged to $506 million, their highest level since early...

Nvidia Networking Sales Soar 143%, Outpace Data Center

NVIDIA's data center networking sales skyrocketed 143% year-over-year, reaching $31.34 billion for fiscal year...

Gate.io gets EU payment license in Malta

Gate obtained a Payment Institution license in Malta under the EU's PSD2 framework.The license...

India’s Gold ETF Inflows Soar 900%, Outpacing Equities

Gold ETF inflows in India have soared to a record ~250 billion rupees (~$3...

Bitcoin Rally Lifts MSTR, CRCL, COIN

Bitcoin's rally toward $69,000 on Wednesday fueled a jump in related equities like Coinbase...

Must Read

10 Best Crypto to Mine Without Special Hardware Equipment

A lot of people mostly think that it takes a difficult process to mine cryptocurrency. today we are going to show you some of...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!