MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Font ResizerAa
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Reading: New GlassWorm Using Invisible Code Hits Attacking VS Code Extensions on OpenVSX Marketplace
Share
Font ResizerAa
MarketAlert – Real-Time Market & Crypto News, Analysis & AlertsMarketAlert – Real-Time Market & Crypto News, Analysis & Alerts
Search
  • Crypto News
    • Altcoins
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
    • Press Releases
    • Latest News
  • Blockchain Technology
    • Blockchain Developments
    • Blockchain Security
    • Layer 2 Solutions
    • Smart Contracts
  • Interviews
    • Crypto Investor Interviews
    • Developer Interviews
    • Founder Interviews
    • Industry Leader Insights
  • Regulations & Policies
    • Country-Specific Regulations
    • Crypto Taxation
    • Global Regulations
    • Government Policies
  • Learn
    • Crypto for Beginners
    • DeFi Guides
    • NFT Guides
    • Staking Guides
    • Trading Strategies
  • Research & Analysis
    • Blockchain Research
    • Coin Research
    • DeFi Research
    • Market Analysis
    • Regulation Reports
Have an existing account? Sign In
Follow US
© Market Alert News. All Rights Reserved.
  • bitcoinBitcoin(BTC)$67,565.00-1.11%
  • ethereumEthereum(ETH)$1,948.45-1.54%
  • tetherTether(USDT)$1.00-0.01%
  • rippleXRP(XRP)$1.39-3.68%
  • binancecoinBNB(BNB)$612.95-2.08%
  • usd-coinUSDC(USDC)$1.000.00%
  • solanaSolana(SOL)$83.26-2.87%
  • tronTRON(TRX)$0.2908400.52%
  • dogecoinDogecoin(DOGE)$0.095083-4.18%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.05-0.02%
Blockchain

New GlassWorm Using Invisible Code Hits Attacking VS Code Extensions on OpenVSX Marketplace

Last updated: October 22, 2025 2:30 pm
Published: 4 months ago
Share

Over the past week, cybersecurity professionals have been gripped by the emergence of GlassWorm, a highly sophisticated, self-propagating malware campaign targeting VS Code extensions on the OpenVSX Marketplace.

The scale and technical complexity of this attack signal a turning point for supply chain security in developer ecosystems.

As of October 2025, over 35,800 installations have reportedly been compromised, with the number growing as active malicious extensions continue to operate in the wild.

The impact is felt not only through direct credential theft but also through deep infiltration of developer machines.

The initial signs of the campaign surfaced when Koi researchers identified unusual behavioral shifts in the seemingly benign “CodeJoy” extension after its 1.8.3 version update.

While the extension passed initial visual code reviews, Koi’s risk engine flagged it for anomalous network connections and credential access.

Undetectable on superficial inspection, the researchers quickly found that the underlying infection vector was both novel and alarming — the malicious code was encoded using invisible Unicode characters, allowing it to blend perfectly with legitimate source files.

The result: entire blocks of JavaScript payload remained unseen to the naked eye and undetectable by most static analysis tools.

Koi’s investigation soon revealed the magnitude of the threat. The worm harvests secrets from npm, GitHub, OpenVSX, and even targets 49 different cryptocurrency wallet extensions.

After siphoning credentials, it leverages them to hijack additional extensions, thereby achieving a self-propagating cycle.

Victims’ devices are then weaponized, serving as criminal proxy nodes or platforms for remote attacks, illustrating a truly distributed and resilient campaign strategy.

Koi analysts confirmed that the attackers architected an unkillable command-and-control (C2) infrastructure using the Solana blockchain.

Alongside blockchain payload distribution, fallback C2 mechanisms — Google Calendar events and direct IP endpoints — make takedown efforts almost futile.

Each communication contains encrypted instructions for further stages, enabling dynamic updates to the malware in near real-time.

This approach enables GlassWorm to adapt swiftly and persistently within compromised networks.

A standout aspect of GlassWorm’s operation is its use of the Unicode “variation selector” exploit. By inserting non-rendering Unicode codepoints into JavaScript source files, the malware hides entire logic branches.

These characters are ignored by visual editors and code review platforms but are recognized and executed by the JavaScript interpreter.

For instance, a segment in the compromised CodeJoy file showed a vast empty space — actually filled with functional malicious code — successfully disguised.

This method fundamentally breaks assumptions of code transparency. Developers, even when manually inspecting diffs or reviewing GitHub commits, cannot see the injected logic.

Only byte-wise or deeply specialized tools can reveal the hidden payload, underscoring the criticality of updating code inspection and CI processes to detect non-standard Unicode — a mitigation priority for defenders.

Read more on Cyber Security News

This news is powered by Cyber Security News Cyber Security News

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook

Like this:

Like Loading...

Related

SilentSwap V2 Launch Sets New Standard for Institutional Blockchain Privacy Infrastructure
Shabbar Zaidi warns crypto could serve as hawala alternative
Best Crypto Rankings in Real-Time Overview & Prices
C1 Fund Inc. Announces Equity Purchase in Ripple, Leading Enterprise Blockchain Solutions Provider
Stripe’s Tempo Blockchain Raises $500 Million, Poaches Prominent Ethereum Dev – Decrypt

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
Previous Article Kuardin Expands AI-Driven E-Commerce Ahead of Global Exchange Listings
Next Article Hong Kong greenlights its first spot Solana ETF, beating the U.S. to market
© Market Alert News. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Prove your humanity


Lost your password?

%d