MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Font ResizerAa
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Reading: New GlassWorm Malware Wave Targets Macs Through Fake Crypto Wallet Tools
Share
Font ResizerAa
MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Search
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Have an existing account? Sign In
Follow US
© Market Alert News. All Rights Reserved.
  • bitcoinBitcoin(BTC)$69,741.000.78%
  • ethereumEthereum(ETH)$2,083.671.16%
  • tetherTether(USDT)$1.000.01%
  • rippleXRP(XRP)$1.495.07%
  • binancecoinBNB(BNB)$631.502.31%
  • usd-coinUSDC(USDC)$1.00-0.01%
  • solanaSolana(SOL)$88.103.23%
  • tronTRON(TRX)$0.2829850.96%
  • dogecoinDogecoin(DOGE)$0.10703910.86%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.02-1.79%
Blockchain

New GlassWorm Malware Wave Targets Macs Through Fake Crypto Wallet Tools

Last updated: January 3, 2026 12:45 am
Published: 1 month ago
Share

A new wave of the GlassWorm malware is now targeting macOS developers by hiding malicious code inside fake Visual Studio Code extensions designed to steal cryptocurrency, credentials, and sensitive system data, security researchers at Koi Security warn.

This is the fourth wave of the campaign in just over two months — and the first to focus exclusively on Macs.

Malicious Extensions Hiding In Plain Sight

GlassWorm is distributed through trojanized extensions hosted on the Open VSX marketplace, an open-source alternative to Microsoft’s official Visual Studio Code extension store. The malicious extensions pose as legitimate developer tools, such as code formatters and theme packs.

Koi Security identified three suspicious extensions on Open VSX that together showed more than 50,000 downloads, though researchers caution that download counts can be manipulated to build false trust.

First spotted in October, Glassworm hid malicious code inside extensions using “invisible” Unicode characters. Subsequent waves replaced this with compiled Rust binaries and expanded the campaign’s reach. Despite being publicly exposed multiple times, the attackers have quickly adapted their techniques and returned with new ones.

“The GlassWorm actor isn’t just persistent – they’re evolving. And now they’re coming for your Mac,” the researchers warned in a blog post published on Monday.

Why Attackers Are Targeting Macs Now?

Previous versions of the Glassworm malware focused on Windows users and relied on different techniques to evade detection. Researchers say the attackers are deliberately targeting macOS because developers — particularly working in crypto, Web3, and start-up environments — overwhelmingly use Macs, making them high-value targets to get access to cryptocurrency wallets, source code, and developer credentials.

Unlike earlier Windows-focused versions, the new GlassWorm variant is built specifically for macOS. It uses AppleScript instead of PowerShell, relies on LaunchAgents for persistence instead of Registry keys and Scheduled Tasks, and directly targets the macOS Keychain to extract stored passwords.

“This isn’t a lazy port,” Koi Security noted. “The attacker knows macOS. This is professional work.”

A Stealthier Delivery Method

The latest GlassWorm payload is encrypted using AES-256-CBC and embedded inside compiled JavaScript within the extension itself. Once installed, it delays execution for 15 minutes before activating — long enough to evade automated security sandboxes, which often stop monitoring after five minutes.

For command-and-control, GlassWorm continues to rely on the Solana blockchain. By embedding command-and-control (C2) server addresses in blockchain transaction memos, the malware can retrieve instructions without relying on traditional servers that can be easily blocked or shut down.

Hardware Wallets At Risk

GlassWorm also introduces code to replace legitimate hardware wallet apps such as Ledger Live and Trezor Suite with trojanized versions. While this feature is not fully active yet, researchers say it could be enabled at any time.

Even without it, the malware remains highly dangerous, targeting over 50 browser-based and desktop cryptocurrency wallets, stealing GitHub and npm credentials, copying SSH keys, harvesting browser cookies, and exfiltrating macOS Keychain data.

What Developers Should Do

Security experts believe GlassWorm is becoming a persistent, cross-platform threat. Developers who may have installed the affected malicious extensions are strongly advised to remove them immediately, reset compromised credentials, revoke access tokens, and consider reinstalling their systems. In some cases, a full system reinstall may be the safest option.

As GlassWorm continues to evolve, the campaign underscores how modern software supply chains are increasingly being abused — reminding users that even tools from well-known marketplaces can carry hidden risks and must be treated with caution.

Read more on TechWorm

This news is powered by TechWorm TechWorm

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Like this:

Like Loading...

Related

Blockchain company targets $200M investment in tokenized water initiatives across Asia
Bitcoin and XRP Integration Boosts Lace Wallet’s Multi-Chain Capabilities – TokenPost
Guide from Inactive Slot machine game wizard slot machines Play Online video Harbors at no cost
Uniswap Founder Blasts NYC Token as Liquidity Fears Spark Industry Backlash – Crypto Economy
Azuki, COMISMA, and Xenotoon to Establish Studio Azuki

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
Previous Article 4 Investment Themes That Will Dominate Market Returns In 2026 – NextEra Energy (NYSE:NEE)
Next Article Vitalik Urges Ethereum To Scale Toward World Computer Goal –
© Market Alert News. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Prove your humanity


Lost your password?

%d