GlassWorm Malware Surges With New macOS‑Focused VS Code Extension Campaign

Related

Depthfirst Secures $40M to Advance AI-Driven Vulnerability Management

What happened Cybersecurity startup Depthfirst has raised $40 million in...

Critical Cal.com Authentication Bypass Lets Attackers Take Over User Accounts

What happened A critical Cal.com authentication bypass lets attackers take...

International Takedown Disrupts RedVDS Cybercrime Platform Driving Phishing and Fraud

What happened International takedown disrupts RedVDS cybercrime platform driving phishing...

Share

What happened

A new wave of the GlassWorm malware campaign has emerged, this time weaponizing malicious Visual Studio Code extensions to target macOS developer environments via the Open VSX marketplace. The fourth iteration of this self‑propagating worm features encrypted payloads, sandbox evasion timing, and hardware wallet trojanization capabilities. Researchers at Koi Security identified multiple suspicious extensions linked by shared infrastructure and encryption keys, with over 50,000 cumulative downloads observed. The malware uses a Solana blockchain‑based command and control (C2) to maintain decentralized control, making traditional takedown efforts ineffective.

Who is affected

Developers and organizations using Visual Studio Code and Open VSX extensions are at risk—particularly macOS users. The malware is engineered to run stealthy payloads after installation, harvest credentials from keychains and developer tools, and even target hardware wallet apps like Ledger Live and Trezor Suite. Anyone who installs or updates compromised extensions may inadvertently execute the malware and expose sensitive credentials or systems. 

Why CISOs should care

GlassWorm exemplifies an evolving supply chain threat with real risks to development workflows, credential security, and broader enterprise infrastructure. Its use of blockchain for resilient C2, sandbox‑evasion timing mechanisms, and malicious persistence makes detection and response more challenging. As development environments often have elevated access and network reach, a compromised developer machine can serve as a pivot point into internal systems or source code repositories. This attack underscores that developer toolchains are critical attack surfaces, not peripheral nuisances.

3 Practical actions for CISOs

  1. Harden Extension Policies: Enforce strict whitelisting and code signing for VS Code/Open VSX extensions; require approval workflows before installation.
  2. Monitor and Isolate Developer Environments: Use endpoint detection with behavioral analytics to flag unusual extension behavior; isolate developer workstations from critical networks.
  3. Credential Protection and Rotation: Apply short‑lived tokens, multifactor authentication, and routine rotation for GitHub, npm/Open VSX, and other developer platform credentials to limit the value of stolen secrets.