GlassWorm Strikes Again: Malware Infects VS Code Extensions with Invisible Attacks
GlassWorm malware is back from its brief vacation, now infecting VS Code extensions via Open VSX and GitHub. Just when developers thought it was safe, this sneaky malware returns, using AI-generated commits and invisible Unicode to hide its tracks. It’s like the malware version of a bad penny, always turning up!

Hot Take:
GlassWorm is back and it’s more slippery than a greased-up pig at a county fair! This malware is making its rounds through Open VSX and GitHub like it’s on a world tour, infecting VS Code extensions with the finesse of a ninja. If you’re a developer, you might want to double-check your extensions before they start whispering your secrets to the dark web. Who knew coding could be this edgy?
Key Points:
- GlassWorm malware has emerged again, targeting Open VSX and GitHub.
- Three additional VS Code extensions have been infected, totaling 10,000 downloads.
- Solana blockchain transactions are used to update command and control (C2) addresses.
- Invisible Unicode malware is used to conceal malicious activities.
- The malware operates on a global scale, affecting critical infrastructure.
Already a member? Log in here
