Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
GlassWorm Malware Infects VS Code Extensions in Widespread Supply Chain Attack
Advertisements

New Self-Propagating Worm Targets Developers

Cybersecurity researchers have identified a self-propagating worm, codenamed GlassWorm, that spreads through Visual Studio Code (VS Code) extensions. The discovery by Koi Security on October 24, 2025, highlights a significant supply chain attack targeting the developer community. The malware was found infecting extensions on both the Open VSX Registry and the official Microsoft Extension Marketplace, underscoring the growing threat to the DevOps pipeline. This incident marks the second major supply chain attack on the developer ecosystem in a month, following the ‘Shai-Hulud’ worm that impacted the npm ecosystem in mid-September 2025.

GlassWorm represents a sophisticated threat, specifically designed to compromise developer environments. By embedding itself within legitimate-seeming VS Code extensions, the worm can spread rapidly as developers install or update their tools, creating a widespread infection across multiple organizations and projects.

Advanced Evasion and C2 Techniques

The GlassWorm campaign is distinguished by its novel technical capabilities. For its command-and-control (C2) infrastructure, the malware utilizes the Solana blockchain, a design choice that makes the C2 network highly resilient to takedown attempts by authorities. In addition to its primary C2, the worm employs Google Calendar as a fallback communication mechanism, adding another layer of durability to its operations.

Another innovative aspect of the attack is its code evasion method. In a technical report, researcher Idan Dardikman noted that the campaign uses “invisible Unicode characters that make malicious code literally disappear from code editors.” The attackers achieved this by using Unicode variation selectors, which are special characters that modify the appearance of preceding characters without being easily visible, thereby hiding the malicious payloads from developers inspecting the source code.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading