Glassworm Strikes Again: Malware Infiltrates VS Code Extensions with Invisible Unicode Cloak

Glassworm’s third wave hits VS Code editors with 24 new malware-laden packages. Sneaky Unicode tricks and Rust implants help it steal developer data, infiltrating popular tools like Flutter and React Native. Despite efforts to contain it, this digital pest keeps crawling back, proving it’s not just bugs that love code.

Pro Dashboard

Hot Take:

Looks like the Glassworm campaign is back and better than ever—like your favorite TV show that just won’t quit after a successful first season. It’s in its third wave now, spreading its malicious cheer across two platforms, leaving developers and cybersecurity experts alike scratching their heads. Forget Halloween; Glassworm is the real horror show this October!

Key Points:

  • Glassworm is a malware campaign targeting OpenVSX and Microsoft Visual Studio Marketplaces.
  • This is the third wave of the campaign with 24 new packages added.
  • The malware hides using “invisible Unicode characters” to stealthily evade detection.
  • It attempts to steal sensitive data like GitHub, npm, and cryptocurrency wallets.
  • Glassworm uses Rust-based implants and manipulates download counts to boost visibility.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?