Malware Mayhem: GlassWorm Infiltrates Developer Extensions with Invisible Code!
GlassWorm malware is targeting developers on Microsoft Visual Studio and OpenVSX marketplaces, infecting 35,800 installations. It uses invisible Unicode characters to hide malicious code and spreads via stolen account info. With command-and-control on Solana blockchain, it’s tough to quash, proving that even malware enjoys its decentralized freedom.

Hot Take:
GlassWorm is the ultimate party crasher, sneaking into the VS Code and OpenVSX bash with invisible ink and a penchant for cryptocurrency pilfering. If malware had a Netflix series, this one would be called “Worms Gone Wild!”
Key Points:
– GlassWorm spreads through the OpenVSX and Microsoft Visual Studio marketplaces, infecting 35,800 installations.
– It uses invisible Unicode characters and blockchain technology to hide and execute its malicious payloads.
– The malware attempts to steal credentials and cryptocurrency wallet data from 49 extensions.
– It transforms infected systems into nodes of a criminal network using massively obfuscated JavaScript.
– Researchers discovered at least twelve extensions infected by GlassWorm, with some still available for download.
