GlassWorm attack installs fake browser extension for surveillance
GlassWorm is a sophisticated malware campaign targeting developers by compromising code repositories and package managers. It infects systems stealthily, fingerprints the machine, and retrieves additional payloads via the Solana blockchain. The malware steals sensitive data such as cryptocurrency wallets and development credentials, installs a Remote Access Trojan (RAT), and deploys a fake Chrome browser extension for extensive surveillance. It leverages distributed hash tables and blockchain technology for resilient command and control, making detection and takedown difficult. Although initially focused on developers with cryptocurrency assets, the stolen data could facilitate broader supply chain attacks. Mitigation requires strict package management hygiene, regular audits of browser extensions, and updated anti-malware defenses. The threat is medium severity due to its complex multi-stage infection and data theft capabilities but requires some user interaction and targeted conditions. Countries with significant developer ecosystems and cryptocurrency usage are at higher risk.
AI Analysis
Technical Summary
GlassWorm is a multi-stage, sophisticated malware campaign primarily targeting software developers by compromising code repositories and package managers, which are critical components of modern software supply chains. The initial infection is stealthy, involving fingerprinting of the infected machine to gather system-specific information. Subsequently, the malware fetches additional payloads through the Solana blockchain, an innovative use of decentralized blockchain infrastructure to enhance resilience and evade traditional command and control (C2) takedowns. The malware’s payload includes an information stealer that targets sensitive data such as cryptocurrency wallets and development credentials, which are valuable for further exploitation. It also installs a Remote Access Trojan (RAT), enabling persistent remote control over the infected system. Additionally, GlassWorm deploys a fake Chrome browser extension designed for extensive surveillance, allowing attackers to monitor user activity and exfiltrate data stealthily. The use of distributed hash tables and blockchain for C2 infrastructure complicates detection and mitigation efforts. While the initial focus is on developers with cryptocurrency assets, the stolen credentials and access could enable wider supply chain attacks, potentially compromising downstream software users and organizations. The malware employs multiple MITRE ATT&CK techniques, including credential access, persistence, execution, and command and control methods, highlighting its complexity and sophistication. No known public exploits or CVEs are associated with GlassWorm yet, but its stealth and multi-vector approach pose a significant threat to software development environments and cryptocurrency holders.
Potential Impact
The impact of GlassWorm is significant for organizations involved in software development, particularly those relying on open-source code repositories and package managers. By stealing development credentials and cryptocurrency wallets, attackers can gain unauthorized access to critical systems and financial assets. The installation of a RAT and a fake browser extension enables persistent surveillance and remote control, increasing the risk of data exfiltration, intellectual property theft, and further compromise of internal networks. The use of blockchain-based C2 infrastructure enhances the malware’s resilience, making incident response and eradication more challenging. Furthermore, the stolen credentials and access could facilitate supply chain attacks, potentially affecting a wide range of downstream organizations and end-users who consume compromised software packages. This could lead to widespread disruption, data breaches, and financial losses. The threat also undermines trust in software supply chains and developer ecosystems, which are foundational to modern IT infrastructure. Organizations with cryptocurrency holdings face additional financial risks due to targeted theft attempts. Overall, GlassWorm poses a medium to high risk to confidentiality, integrity, and availability of affected systems, especially in environments where developers have elevated privileges or access to sensitive assets.
Mitigation Recommendations
To mitigate the GlassWorm threat, organizations should implement a multi-layered security approach tailored to the software development lifecycle and endpoint protection. Specific recommendations include: 1) Enforce strict package management policies by verifying the integrity and provenance of code dependencies and regularly auditing third-party packages for suspicious modifications. 2) Implement robust access controls and multi-factor authentication (MFA) for developer accounts and code repositories to prevent credential compromise. 3) Conduct regular audits of installed browser extensions, especially in development environments, removing any unverified or suspicious extensions. 4) Deploy endpoint detection and response (EDR) solutions capable of identifying stealthy malware behaviors, including unusual network communications to blockchain nodes or distributed hash tables. 5) Monitor network traffic for anomalous connections to known malicious IP addresses such as 45.150.34.158 and suspicious blockchain-related activity. 6) Educate developers on the risks of installing untrusted packages and extensions, emphasizing the importance of security hygiene. 7) Maintain up-to-date anti-malware and security patches on all development and endpoint systems. 8) Consider isolating development environments and sensitive cryptocurrency wallets from general-purpose systems to limit lateral movement. 9) Establish incident response plans that include blockchain-related threat intelligence and forensic capabilities. These targeted measures go beyond generic advice by focusing on the unique multi-stage infection vectors and blockchain-based C2 mechanisms employed by GlassWorm.
Affected Countries
United States, China, India, Germany, United Kingdom, South Korea, Japan, Canada, Australia, Singapore
Indicators of Compromise
- ip: 45.150.34.158
GlassWorm attack installs fake browser extension for surveillance
Description
GlassWorm is a sophisticated malware campaign targeting developers by compromising code repositories and package managers. It infects systems stealthily, fingerprints the machine, and retrieves additional payloads via the Solana blockchain. The malware steals sensitive data such as cryptocurrency wallets and development credentials, installs a Remote Access Trojan (RAT), and deploys a fake Chrome browser extension for extensive surveillance. It leverages distributed hash tables and blockchain technology for resilient command and control, making detection and takedown difficult. Although initially focused on developers with cryptocurrency assets, the stolen data could facilitate broader supply chain attacks. Mitigation requires strict package management hygiene, regular audits of browser extensions, and updated anti-malware defenses. The threat is medium severity due to its complex multi-stage infection and data theft capabilities but requires some user interaction and targeted conditions. Countries with significant developer ecosystems and cryptocurrency usage are at higher risk.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
GlassWorm is a multi-stage, sophisticated malware campaign primarily targeting software developers by compromising code repositories and package managers, which are critical components of modern software supply chains. The initial infection is stealthy, involving fingerprinting of the infected machine to gather system-specific information. Subsequently, the malware fetches additional payloads through the Solana blockchain, an innovative use of decentralized blockchain infrastructure to enhance resilience and evade traditional command and control (C2) takedowns. The malware’s payload includes an information stealer that targets sensitive data such as cryptocurrency wallets and development credentials, which are valuable for further exploitation. It also installs a Remote Access Trojan (RAT), enabling persistent remote control over the infected system. Additionally, GlassWorm deploys a fake Chrome browser extension designed for extensive surveillance, allowing attackers to monitor user activity and exfiltrate data stealthily. The use of distributed hash tables and blockchain for C2 infrastructure complicates detection and mitigation efforts. While the initial focus is on developers with cryptocurrency assets, the stolen credentials and access could enable wider supply chain attacks, potentially compromising downstream software users and organizations. The malware employs multiple MITRE ATT&CK techniques, including credential access, persistence, execution, and command and control methods, highlighting its complexity and sophistication. No known public exploits or CVEs are associated with GlassWorm yet, but its stealth and multi-vector approach pose a significant threat to software development environments and cryptocurrency holders.
Potential Impact
The impact of GlassWorm is significant for organizations involved in software development, particularly those relying on open-source code repositories and package managers. By stealing development credentials and cryptocurrency wallets, attackers can gain unauthorized access to critical systems and financial assets. The installation of a RAT and a fake browser extension enables persistent surveillance and remote control, increasing the risk of data exfiltration, intellectual property theft, and further compromise of internal networks. The use of blockchain-based C2 infrastructure enhances the malware’s resilience, making incident response and eradication more challenging. Furthermore, the stolen credentials and access could facilitate supply chain attacks, potentially affecting a wide range of downstream organizations and end-users who consume compromised software packages. This could lead to widespread disruption, data breaches, and financial losses. The threat also undermines trust in software supply chains and developer ecosystems, which are foundational to modern IT infrastructure. Organizations with cryptocurrency holdings face additional financial risks due to targeted theft attempts. Overall, GlassWorm poses a medium to high risk to confidentiality, integrity, and availability of affected systems, especially in environments where developers have elevated privileges or access to sensitive assets.
Mitigation Recommendations
To mitigate the GlassWorm threat, organizations should implement a multi-layered security approach tailored to the software development lifecycle and endpoint protection. Specific recommendations include: 1) Enforce strict package management policies by verifying the integrity and provenance of code dependencies and regularly auditing third-party packages for suspicious modifications. 2) Implement robust access controls and multi-factor authentication (MFA) for developer accounts and code repositories to prevent credential compromise. 3) Conduct regular audits of installed browser extensions, especially in development environments, removing any unverified or suspicious extensions. 4) Deploy endpoint detection and response (EDR) solutions capable of identifying stealthy malware behaviors, including unusual network communications to blockchain nodes or distributed hash tables. 5) Monitor network traffic for anomalous connections to known malicious IP addresses such as 45.150.34.158 and suspicious blockchain-related activity. 6) Educate developers on the risks of installing untrusted packages and extensions, emphasizing the importance of security hygiene. 7) Maintain up-to-date anti-malware and security patches on all development and endpoint systems. 8) Consider isolating development environments and sensitive cryptocurrency wallets from general-purpose systems to limit lateral movement. 9) Establish incident response plans that include blockchain-related threat intelligence and forensic capabilities. These targeted measures go beyond generic advice by focusing on the unique multi-stage infection vectors and blockchain-based C2 mechanisms employed by GlassWorm.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://securityboulevard.com/2026/03/glassworm-attack-installs-fake-browser-extension-for-surveillance/"]
- Adversary
- GlassWorm
- Pulse Id
- 69c59ad1d050c7b6a823051e
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip45.150.34.158 | — |
Threat ID: 69c5a8cd3c064ed76fd1d9de
Added to database: 3/26/2026, 9:44:45 PM
Last enriched: 3/26/2026, 10:00:38 PM
Last updated: 3/27/2026, 5:25:54 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.