GlassWorm Strikes Again: A Comedy of Errors in Cybersecurity!
The GlassWorm malware has slithered back into the Open VSX registry, just weeks after being evicted from the Visual Studio Code extensions marketplace. Koi Security discovered new infected extensions, showing that GlassWorm is not just a bug; it’s a determined pest, cleverly hiding its tracks and wreaking havoc on unsuspecting developers.

Hot Take:
Just when you thought it was safe to code again, GlassWorm comes crawling back like that ex you thought you’d blocked on all social media platforms. But fear not, Open VSX is on it like a cat on a laser pointer. Here’s your chance to be the cybersecurity hero you always wanted to be—by doing nothing but updating your extensions. Who knew laziness could be a superpower?
Key Points:
- GlassWorm malware made a comeback in the Open VSX registry after a brief hiatus from the VS Code marketplace.
- The malware’s mission: steal credentials and funds from users, targeting 49 cryptocurrency extensions.
- It uses Unicode variation selectors for stealth and the Solana blockchain for its command-and-control operations.
- Recent discoveries show GlassWorm has been downloaded 10,000 times in its latest act of mischief.
- Koi Security traced the attacker’s infrastructure, which includes a Russian-speaking threat actor and multiple crypto exchanges.
Already a member? Log in here
