Malware & RansomwareHIGH

GlassWorm Malware Expands Reach with 72 Malicious Extensions

CSCyber Security News
GlassWormOpen VSXmalwaretransitive dependenciesSocket Research Team
🎯

Basically, a new malware called GlassWorm tricks developers by hiding in software updates.

Quick Summary

The GlassWorm malware campaign has escalated, infecting developer environments through 72 malicious Open VSX extensions. Developers using popular tools are at risk, as attackers employ clever tricks to bypass security measures. Immediate action is necessary to protect sensitive data and maintain secure coding practices.

What Happened

In a significant escalation of supply chain attacks, the GlassWorm malware campaign has evolved to target developer environments. On March 13, 2026, the Socket Research Team reported discovering at least 72 new malicious Open VSX extensions associated with this campaign. Instead of embedding the malicious payload? directly, attackers now use a clever technique that involves transitive dependencies?, allowing them to infect systems after initial trust is established.

The attackers disguise their malicious software by first publishing seemingly harmless extensions. Once developers install these extensions and trust them, the attackers push out updates that modify the extension’s manifest files?. This hidden update links to a separate GlassWorm loader, which is installed automatically in the background. This approach makes it nearly impossible for standard code reviews to catch the malicious activity.

Who's Being Targeted

The GlassWorm campaign primarily targets developers, particularly those using popular tools and programming languages. The malicious extensions impersonate widely-used utilities like Prettier and ESLint, as well as language-specific tools for Python, Vue, Angular, and Flutter. Notably, the campaign also targets developers utilizing AI tools, with extensions mimicking popular AI assistants like Claude Code and Codex.

To enhance their deception, attackers have employed typosquatting techniques, where they create extensions with slight variations of legitimate publisher names. This strategy aims to trick unsuspecting developers into believing they are downloading safe tools, thus increasing the likelihood of infection.

Signs of Infection

The latest variants of GlassWorm exhibit advanced capabilities that make detection challenging. Some indicators of compromise? include:

  • Infrastructure rotation: Attackers have changed their wallet infrastructure and command-and-control IP addresses? to evade detection.
  • Advanced obfuscation: The malware now uses complex techniques to hide its true nature, making it harder for security tools to identify.
  • Remote decryption: Decryption keys? are fetched dynamically from attacker-controlled servers, rather than being embedded in the extension.

These features allow the malware to remain resilient and evade traditional security measures, posing a significant threat to developer environments.

How to Protect Yourself

To defend against the GlassWorm threat, development teams must adopt new security practices. Here are some recommended actions:

  • Audit version history: Regularly check the version history of installed extensions for any newly introduced relationships that could indicate malicious activity.
  • Review update chains: Instead of only scanning the current extension code, examine the entire installation and update history.
  • Hunt for indicators of compromise: Look for signs such as Solana memo lookups or unusual locale gating in the code.
  • Remove known threats: Immediately block and uninstall any identified GlassWorm-linked packages from workstations and check for exposed environment tokens.

By implementing these measures, developers can better safeguard their environments against the evolving GlassWorm malware campaign.

💡 Tap dotted terms for explanations

🔒 Pro insight: The GlassWorm campaign's use of transitive dependencies marks a troubling trend in supply chain attacks, necessitating enhanced vigilance in extension management.

Original article from

Cyber Security News · Dhivya

Read Full Article

Related Pings

HIGHMalware & Ransomware

AppsFlyer SDK Hijacked to Deploy Crypto-Stealing Malware

What Happened This week, the AppsFlyer Web SDK was hijacked in a serious supply-chain attack. Malicious code was injected into the SDK, which is widely used for marketing analytics by over 15,000 businesses globally. The compromised code was designed to intercept cryptocurrency wallet addresses entered by users on various websites. Instead of sending funds to the intended wallet, the

BleepingComputer·
HIGHMalware & Ransomware

GlassWorm Campaign Exploits 72 Extensions to Target Developers

A new GlassWorm campaign exploits 72 malicious extensions targeting developers. This sophisticated attack uses seemingly harmless tools to deliver malware. Developers must stay vigilant to protect their systems from these threats.

The Hacker News·
HIGHMalware & Ransomware

Malicious npm Packages Steal Discord and Crypto Data

A sophisticated supply chain attack has emerged, targeting Discord and cryptocurrency wallets. Users of npm packages are at risk of having their sensitive data stolen. Immediate action is required to secure accounts and data.

Cyber Security News·
HIGHMalware & Ransomware

SmartApeSG Campaign Deploys Remcos RAT via ClickFix Page

A new campaign is using a fake ClickFix page to spread Remcos RAT. Individuals and organizations are at risk of remote access and data theft. Stay vigilant and protect your systems from this growing threat.

SANS ISC Full Text·
HIGHMalware & Ransomware

Ransomware Negotiator Allegedly Extorted Victims for Millions

A ransomware negotiator is accused of extorting victims for millions. DigitalMint claims ignorance of his actions. This scandal raises serious concerns about trust in cybersecurity professionals.

SC Media·
HIGHMalware & Ransomware

New VENON Malware Targets Brazilian Banking Users

A new malware called VENON is targeting Brazilian banking users. This Rust-based threat employs advanced techniques to steal sensitive information. Stay alert and protect your accounts from this evolving danger.

SC Media·