Glassworm Strikes Again: Malware Infiltrates VS Code Extensions with Invisible Unicode Cloak
Glassworm’s third wave hits VS Code editors with 24 new malware-laden packages. Sneaky Unicode tricks and Rust implants help it steal developer data, infiltrating popular tools like Flutter and React Native. Despite efforts to contain it, this digital pest keeps crawling back, proving it’s not just bugs that love code.

Hot Take:
Looks like the Glassworm campaign is back and better than ever—like your favorite TV show that just won’t quit after a successful first season. It’s in its third wave now, spreading its malicious cheer across two platforms, leaving developers and cybersecurity experts alike scratching their heads. Forget Halloween; Glassworm is the real horror show this October!
Key Points:
- Glassworm is a malware campaign targeting OpenVSX and Microsoft Visual Studio Marketplaces.
- This is the third wave of the campaign with 24 new packages added.
- The malware hides using “invisible Unicode characters” to stealthily evade detection.
- It attempts to steal sensitive data like GitHub, npm, and cryptocurrency wallets.
- Glassworm uses Rust-based implants and manipulates download counts to boost visibility.
Already a member? Log in here
