Connect with us

Security

Glassworm Malware Strikes Again with Third Wave of Malicious VS Code Packages

Published

on

The Glassworm Campaign: A Deep Dive into the Malware Targeting VS Code Developers

Recently, the Glassworm campaign has resurfaced with 24 new packages infiltrating the OpenVSX and Microsoft Visual Studio marketplaces. This malicious software, first detected in October, poses a significant threat to developers utilizing VS Code-compatible editors.

OpenVSX and the Microsoft Visual Studio Marketplace serve as extension repositories for developers, offering a range of language support, frameworks, themes, and productivity add-ons. While the Microsoft marketplace is the official platform for Visual Studio Code, OpenVSX provides an open, vendor-neutral alternative for editors outside of Microsoft’s ecosystem.

Initially uncovered by Koi Security, Glassworm employs stealthy tactics by using “invisible Unicode characters” to conceal its malicious code. Once installed, the malware targets GitHub, npm, and OpenVSX accounts, as well as cryptocurrency wallet data from 49 extensions.

Furthermore, Glassworm deploys a SOCKS proxy to facilitate malicious traffic through the victim’s machine and installs an HVNC client for covert remote access by operators.

Despite initial efforts to remove the infection from the extension repositories, Glassworm resurfaced with new extensions and publisher accounts shortly after. Secure Annex’s researcher, John Tuckner, identified the resurgence, highlighting a broad scope targeting popular tools and developer frameworks such as Flutter, Vim, Yaml, Tailwind, Svelte, React Native, and Vue.


Legitimate (left) and impersonator (right) packages
Source: Secure Annex

Secure Annex’s latest findings reveal a third wave of Glassworm utilizing specific packages on both the VS Marketplace and Open VSX. These packages are strategically designed to infiltrate the marketplaces, with publishers pushing updates that introduce malicious code while inflating download counts to appear legitimate and trustworthy.

See also  Router Traffic Hijacked: The DKnife Linux Toolkit's Malicious Mission

Manipulating download counts not only deceives users but also impacts search results, positioning the malicious extensions closely alongside legitimate projects they impersonate.

Confusing search results
Confusing search results
Source: Secure Annex

On the technical front, Glassworm has evolved to incorporate Rust-based implants within extensions, alongside the continued use of invisible Unicode characters. This advancement poses a greater challenge to detection and mitigation efforts.

Payload
Payload
Source: Secure Annex

BleepingComputer has reached out to OpenVSX and Microsoft for comments on Glassworm’s persistence in bypassing their defenses. Updates on their responses will be provided as soon as available.

tines

Broken IAM isn’t just an IT problem – the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what “good” IAM looks like, and a simple checklist for building a scalable strategy.

Trending