• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
glassworm returns with 24 malicious extensions impersonating popular developer tools

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

You are here: Home / General Cyber Security News / GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools
December 2, 2025

The supply chain campaign known as GlassWorm has once again reared its head, infiltrating both Microsoft Visual Studio Marketplace and Open VSX with 24 extensions impersonating popular developer tools and frameworks like Flutter, React, Tailwind, Vim, and Vue.

GlassWorm was first documented in October 2025, detailing its use of the Solana blockchain for command-and-control (C2) and harvest npm, Open VSX, GitHub, and Git credentials, drain cryptocurrency assets from dozens of wallets, and turn developer machines into attacker-controlled nodes for other criminal activities.

The most crucial aspect of the campaign is the abuse of the stolen credentials to compromise additional packages and extensions, thereby spreading the malware like a worm. Despite continued efforts of Microsoft and Open VSX, the malware resurfaced a second time last month, and the attackers were observed targeting GitHub repositories.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The latest wave of the GlassWorm campaign, spotted by Secure Annex’s John Tuckner, involves a total of 24 extensions spanning both repositories. The list of identified extensions is below –

Cybersecurity

VS Code Marketplace:

  • iconkieftwo.icon-theme-materiall
  • prisma-inc.prisma-studio-assistance (removed as of December 1, 2025)
  • prettier-vsc.vsce-prettier
  • flutcode.flutter-extension
  • csvmech.csvrainbow
  • codevsce.codelddb-vscode
  • saoudrizvsce.claude-devsce
  • clangdcode.clangd-vsce
  • cweijamysq.sync-settings-vscode
  • bphpburnsus.iconesvscode
  • klustfix.kluster-code-verify
  • vims-vsce.vscode-vim
  • yamlcode.yaml-vscode-extension
  • solblanco.svetle-vsce
  • vsceue.volar-vscode
  • redmat.vscode-quarkus-pro
  • msjsdreact.react-native-vsce

Open VSX:

  • bphpburn.icons-vscode
  • tailwind-nuxt.tailwindcss-for-react
  • flutcode.flutter-extension
  • yamlcode.yaml-vscode-extension
  • saoudrizvsce.claude-dev
  • saoudrizvsce.claude-devsce
  • vitalik.solidity

The attackers have been found to artificially inflate the download counts to make the extensions appear trustworthy and cause them to prominently appear in search results, often in close proximity to the actual projects they impersonate to deceive developers into installing them.

“Once the extension has been approved initially, the attacker seems to easily be able to update code with a new malicious version and easily evade filters,” Tuckner said. “Many code extensions begin with an ‘activate’ context, and the malicious code is slipped in right after the activation occurs.”

Cybersecurity

The new iteration, while still relying on the invisible Unicode trick, is characterized by the use of Rust-based implants that are packaged inside the extensions. In an analysis of the “icon-theme-materiall” extension, Nextron Systems said it comes with two Rust implants that are capable of targeting Windows and macOS systems –

  • A Windows DLL named os.node
  • A macOS dynamic library named darwin.node

As observed in the previous GlassWorm infections, the implants are designed to fetch details of the C2 server from a Solana blockchain wallet address and use it to download the next-stage payload, an encrypted JavaScript file. As a backup, they can parse a Google Calendar event to fetch the C2 address.

“Rarely does an attacker publish 20+ malicious extensions across both of the most popular marketplaces in a week,” Tuckner said in a statement. “Many developers could easily be fooled by these extensions and are just one click away from compromise.”

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «malicious npm package uses hidden prompt and script to evade Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools
Next Post: Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera researchers capture lazarus apt's remote worker scheme live on camera»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.