Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Glassworm malware returns in third wave of malicious VS Code packages

0
High
Published: Tue Dec 02 2025 (12/02/2025, 00:37:53 UTC)
Source: Reddit InfoSec News

Description

The Glassworm malware has resurfaced in a third wave, distributed via malicious Visual Studio Code (VS Code) packages. This malware campaign targets developers by leveraging the popularity of VS Code extensions to infiltrate systems. Once installed, Glassworm can execute malicious payloads, potentially compromising confidentiality, integrity, and availability of affected systems. Although no known exploits in the wild have been reported yet, the high severity rating reflects the risk posed by supply chain attacks through trusted development tools. European organizations relying on VS Code for software development are at risk, especially those in technology, finance, and critical infrastructure sectors. Mitigation requires strict controls on extension sourcing, enhanced monitoring for anomalous behaviors, and developer awareness training. Countries with strong software development industries and high VS Code adoption, such as Germany, the UK, France, and the Netherlands, are most likely to be affected. Given the ease of exploitation via user installation and the broad impact potential, the suggested severity is high.

AI-Powered Analysis

AILast updated: 12/02/2025, 00:51:28 UTC

Technical Analysis

Glassworm malware has re-emerged in a third wave of malicious packages targeting Visual Studio Code, a widely used source-code editor. Attackers distribute compromised VS Code extensions containing the Glassworm payload, exploiting the trust developers place in the VS Code marketplace. Upon installation, the malware can execute arbitrary code, enabling attackers to perform reconnaissance, data exfiltration, or establish persistence within development environments. This supply chain attack vector is particularly insidious because it leverages legitimate software distribution channels, making detection more difficult. Although no specific affected versions or patches are identified, the campaign's high severity underscores the threat's potential impact. The malware's return indicates ongoing adversary interest in targeting developer tools to gain footholds in enterprise networks. The technical details are limited, but the trusted source and recent reporting confirm the malware's active status. The lack of known exploits in the wild suggests early-stage detection, providing an opportunity for preemptive defense. The campaign's focus on VS Code extensions highlights the need for vigilance in managing development toolchains and dependencies.

Potential Impact

European organizations face significant risks from this Glassworm campaign due to the widespread use of VS Code in software development across the continent. Compromise of developer machines can lead to intellectual property theft, insertion of backdoors into software products, and lateral movement within corporate networks. Critical sectors such as finance, telecommunications, and manufacturing could experience operational disruptions or data breaches. The malware’s ability to execute arbitrary code post-installation threatens confidentiality and integrity of sensitive data and software. Additionally, supply chain compromise undermines trust in software development processes, potentially affecting downstream customers and partners. The high severity rating reflects the malware’s potential to cause broad and deep impact, especially in environments where development and production systems are interconnected. Early detection and containment are crucial to prevent escalation and widespread damage.

Mitigation Recommendations

To mitigate the Glassworm threat, European organizations should implement strict policies restricting VS Code extension installations to only those vetted and approved by internal security teams. Employ application whitelisting and endpoint detection and response (EDR) tools to monitor for unusual behaviors associated with malicious extensions. Enforce multi-factor authentication and least privilege principles for developer accounts to limit malware propagation. Regularly audit and update software supply chain components, including extensions and dependencies, to detect anomalies. Conduct targeted security awareness training for developers emphasizing risks of installing unverified extensions. Utilize network segmentation to isolate development environments from critical production systems. Collaborate with VS Code marketplace maintainers to report and remove malicious packages promptly. Finally, maintain up-to-date backups and incident response plans tailored to supply chain compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Source Type
reddit
Subreddit
InfoSecNews
Reddit Score
1
Discussion Level
minimal
Content Source
reddit_link_post
Domain
bleepingcomputer.com
Newsworthiness Assessment
{"score":50.1,"reasons":["external_link","trusted_domain","newsworthy_keywords:malware","non_newsworthy_keywords:vs","established_author","very_recent"],"isNewsworthy":true,"foundNewsworthy":["malware"],"foundNonNewsworthy":["vs"]}
Has External Source
true
Trusted Domain
true

Threat ID: 692e3805f2f793a7de175e4b

Added to database: 12/2/2025, 12:51:17 AM

Last enriched: 12/2/2025, 12:51:28 AM

Last updated: 12/2/2025, 2:27:18 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats