Cybersecurity researchers discovered GlassWorm, a self-propagating worm spreading through Visual Studio Code extensions. This sophisticated supply chain attack has infected 14 extensions with 35,800+ downloads.
What Makes GlassWorm Dangerous?
- Uses invisible Unicode characters to hide malicious code from developers
- Leverages Solana blockchain for command-and-control (resilient to takedowns)
- Steals credentials (npm, GitHub, Git, Open VSX tokens)
- Drains 49 different types of cryptocurrency wallets
- Installs SOCKS proxy and hidden VNC for remote access
- Auto-updates through VS Code without user interaction
Infected Extensions (14):
- codejoy.codejoy-vscode-extension (1.8.3, 1.8.4)
- cline-ai-main.cline-ai-agent (3.1.3)
- CodeInKlingon.git-worktree-menu, SIRILMP.dark-theme-sm
- And 10 more extensions
How It Works:
Attackers compromise extension publisher accounts, inject malicious code using Unicode variation selectors (literally invisible in code editors), and use Solana blockchain transactions to store encrypted C2 commands. The malware then steals credentials and uses them to compromise MORE extensions, creating a self-propagating worm.
Free Scanner Tools:
I created detection tools in both Python (cross-platform) and PowerShell (Windows):
https://sevenlegend.io/?page=codes
The scanners detect:
✓ All 14 known infected extensions
✓ Invisible Unicode characters in code
✓ Blockchain C2 patterns
✓ Credential theft indicators
✓ System compromise (SOCKS proxy, VNC servers)
If You're Infected:
1. Run the scanner with --remove flag
2. Rotate ALL credentials (GitHub, npm, Git, API keys)
3. Check cryptocurrency wallets for unauthorized transactions
4. Scan for system-level compromise
5. Disable VS Code auto-updates temporarily
Source: Koi Security Research
https://www.koi.ai/blog/glassworm-first-self-propagating-...