GlassWorm: Self-Propagating VSCode Extension Worm
GlassWorm is a groundbreaking self-propagating worm targeting VS Code extensions on OpenVSX marketplace. It employs invisible Unicode characters to conceal malicious code and utilizes a blockchain-based command and control infrastructure on Solana. The worm compromised seven OpenVSX extensions with 35,800 downloads, harvesting NPM, GitHub, and Git credentials, targeting cryptocurrency wallets, deploying SOCKS proxy servers, and installing hidden VNC servers. It spreads exponentially through the developer ecosystem using stolen credentials. The worm employs a triple-layer C2 setup involving Solana blockchain, direct IP connection, and Google Calendar. A new infected extension was also detected in Microsoft's VSCode marketplace. The campaign remains active, necessitating immediate security measures and audits of installed extensions.
AI Analysis
Technical Summary
GlassWorm represents an advanced malware campaign targeting the Visual Studio Code (VSCode) ecosystem, specifically focusing on extensions distributed via the OpenVSX marketplace and Microsoft's official VSCode marketplace. The worm leverages invisible Unicode characters to obfuscate malicious code within legitimate-looking extensions, evading detection by standard code reviews and automated scanners. Once installed, GlassWorm harvests sensitive developer credentials, including those for NPM, GitHub, and Git repositories, enabling it to access source code repositories and potentially inject malicious code or exfiltrate intellectual property. It also targets cryptocurrency wallets, indicating a financial motivation. The worm establishes a complex, resilient command and control (C2) infrastructure using a triple-layer approach: a blockchain-based C2 on the Solana network, direct IP connections to attacker-controlled servers, and covert communication via Google Calendar events. This multi-faceted C2 setup complicates takedown efforts and detection. GlassWorm deploys SOCKS proxy servers to anonymize traffic and hidden VNC servers to enable remote control of infected machines. Its self-propagating nature allows it to spread exponentially by using stolen credentials to publish new malicious extensions or update existing ones, thereby infiltrating the developer ecosystem deeply. The discovery of infected extensions on Microsoft's official VSCode marketplace raises concerns about the supply chain security of widely trusted software repositories. The campaign is ongoing, emphasizing the need for continuous monitoring and proactive security measures within development environments.
Potential Impact
For European organizations, GlassWorm poses a multifaceted threat. The compromise of developer credentials can lead to unauthorized access to proprietary source code, intellectual property theft, and insertion of backdoors or malicious code into software products, potentially affecting software supply chains across Europe. The targeting of cryptocurrency wallets may result in direct financial losses for individuals and organizations involved in crypto transactions. The deployment of SOCKS proxies and hidden VNC servers can facilitate lateral movement within corporate networks, espionage, and data exfiltration. Given the widespread use of VSCode and its extensions among European developers, the worm's self-propagation mechanism could rapidly increase infection rates, impacting software development integrity and operational continuity. The presence of infected extensions on both OpenVSX and Microsoft's marketplace broadens the attack surface, increasing the likelihood of exposure. Additionally, the worm's use of blockchain and cloud services for C2 complicates detection and mitigation efforts, potentially allowing prolonged undetected presence within networks. This threat could undermine trust in open-source and third-party software repositories, affecting software development practices and supply chain security in Europe.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to this threat. First, conduct comprehensive audits of all installed VSCode extensions, verifying their provenance and checking for recent updates or unusual behaviors. Employ static and dynamic analysis tools capable of detecting obfuscated code, including invisible Unicode characters. Restrict the installation of extensions to those from verified, trusted sources and consider using allowlists rather than blacklists. Implement credential hygiene best practices: enforce multi-factor authentication (MFA) on all developer accounts (NPM, GitHub, Git), rotate credentials regularly, and monitor for credential leaks or unauthorized access. Network monitoring should focus on detecting unusual outbound connections, especially to known malicious IPs or domains associated with the worm’s C2 infrastructure, including Solana blockchain nodes and suspicious Google Calendar API usage. Deploy endpoint detection and response (EDR) solutions with behavioral analytics to identify SOCKS proxy deployments and hidden VNC servers. Educate developers about the risks of installing unverified extensions and the importance of reporting suspicious activity. Finally, collaborate with marketplace providers to report and remove malicious extensions promptly and participate in threat intelligence sharing within the European cybersecurity community.
Affected Countries
France, Germany, United Kingdom, Netherlands, Poland, Italy, Spain, Sweden
Indicators of Compromise
- ip: 140.82.52.31
- url: http://217.69.3.218/get_zombi_payload/qQD%2FJoi3WCWSk8ggGHiTdg%3D%3D
- url: http://217.69.3.218/get_arhive_npm/
GlassWorm: Self-Propagating VSCode Extension Worm
Description
GlassWorm is a groundbreaking self-propagating worm targeting VS Code extensions on OpenVSX marketplace. It employs invisible Unicode characters to conceal malicious code and utilizes a blockchain-based command and control infrastructure on Solana. The worm compromised seven OpenVSX extensions with 35,800 downloads, harvesting NPM, GitHub, and Git credentials, targeting cryptocurrency wallets, deploying SOCKS proxy servers, and installing hidden VNC servers. It spreads exponentially through the developer ecosystem using stolen credentials. The worm employs a triple-layer C2 setup involving Solana blockchain, direct IP connection, and Google Calendar. A new infected extension was also detected in Microsoft's VSCode marketplace. The campaign remains active, necessitating immediate security measures and audits of installed extensions.
AI-Powered Analysis
Technical Analysis
GlassWorm represents an advanced malware campaign targeting the Visual Studio Code (VSCode) ecosystem, specifically focusing on extensions distributed via the OpenVSX marketplace and Microsoft's official VSCode marketplace. The worm leverages invisible Unicode characters to obfuscate malicious code within legitimate-looking extensions, evading detection by standard code reviews and automated scanners. Once installed, GlassWorm harvests sensitive developer credentials, including those for NPM, GitHub, and Git repositories, enabling it to access source code repositories and potentially inject malicious code or exfiltrate intellectual property. It also targets cryptocurrency wallets, indicating a financial motivation. The worm establishes a complex, resilient command and control (C2) infrastructure using a triple-layer approach: a blockchain-based C2 on the Solana network, direct IP connections to attacker-controlled servers, and covert communication via Google Calendar events. This multi-faceted C2 setup complicates takedown efforts and detection. GlassWorm deploys SOCKS proxy servers to anonymize traffic and hidden VNC servers to enable remote control of infected machines. Its self-propagating nature allows it to spread exponentially by using stolen credentials to publish new malicious extensions or update existing ones, thereby infiltrating the developer ecosystem deeply. The discovery of infected extensions on Microsoft's official VSCode marketplace raises concerns about the supply chain security of widely trusted software repositories. The campaign is ongoing, emphasizing the need for continuous monitoring and proactive security measures within development environments.
Potential Impact
For European organizations, GlassWorm poses a multifaceted threat. The compromise of developer credentials can lead to unauthorized access to proprietary source code, intellectual property theft, and insertion of backdoors or malicious code into software products, potentially affecting software supply chains across Europe. The targeting of cryptocurrency wallets may result in direct financial losses for individuals and organizations involved in crypto transactions. The deployment of SOCKS proxies and hidden VNC servers can facilitate lateral movement within corporate networks, espionage, and data exfiltration. Given the widespread use of VSCode and its extensions among European developers, the worm's self-propagation mechanism could rapidly increase infection rates, impacting software development integrity and operational continuity. The presence of infected extensions on both OpenVSX and Microsoft's marketplace broadens the attack surface, increasing the likelihood of exposure. Additionally, the worm's use of blockchain and cloud services for C2 complicates detection and mitigation efforts, potentially allowing prolonged undetected presence within networks. This threat could undermine trust in open-source and third-party software repositories, affecting software development practices and supply chain security in Europe.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to this threat. First, conduct comprehensive audits of all installed VSCode extensions, verifying their provenance and checking for recent updates or unusual behaviors. Employ static and dynamic analysis tools capable of detecting obfuscated code, including invisible Unicode characters. Restrict the installation of extensions to those from verified, trusted sources and consider using allowlists rather than blacklists. Implement credential hygiene best practices: enforce multi-factor authentication (MFA) on all developer accounts (NPM, GitHub, Git), rotate credentials regularly, and monitor for credential leaks or unauthorized access. Network monitoring should focus on detecting unusual outbound connections, especially to known malicious IPs or domains associated with the worm’s C2 infrastructure, including Solana blockchain nodes and suspicious Google Calendar API usage. Deploy endpoint detection and response (EDR) solutions with behavioral analytics to identify SOCKS proxy deployments and hidden VNC servers. Educate developers about the risks of installing unverified extensions and the importance of reporting suspicious activity. Finally, collaborate with marketplace providers to report and remove malicious extensions promptly and participate in threat intelligence sharing within the European cybersecurity community.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.truesec.com/hub/blog/glassworm-self-propagating-vscode-extension"]
- Adversary
- GlassWorm
- Pulse Id
- 68f7b9ecf349cd47ba5c8f84
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip140.82.52.31 | CC=FR ASN=AS20473 the constant company llc |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://217.69.3.218/get_zombi_payload/qQD%2FJoi3WCWSk8ggGHiTdg%3D%3D | — | |
urlhttp://217.69.3.218/get_arhive_npm/ | — |
Threat ID: 68f7ddd50ecb6bf8118c7f03
Added to database: 10/21/2025, 7:24:05 PM
Last enriched: 10/21/2025, 7:43:00 PM
Last updated: 12/7/2025, 3:37:22 PM
Views: 249
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-12-06
MediumChinese State Hackers Use New BRICKSTORM Malware Against VMware Systems
MediumAutoIT3 Compiled Scripts Dropping Shellcodes, (Fri, Dec 5th)
MediumThreatFox IOCs for 2025-12-05
MediumChina-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.