Glassworm’s Stealthy Return: How Invisible Code is Infecting VS Code Ecosystems

Glassworm malware has resurfaced in VS Code extensions, using invisible Unicode to hide code and Solana blockchain for control, infecting thousands and stealing credentials. This supply-chain attack highlights vulnerabilities in developer tools, urging enhanced security measures across ecosystems.
Glassworm’s Stealthy Return: How Invisible Code is Infecting VS Code Ecosystems
Written by Eric Hastings

In the ever-evolving landscape of cybersecurity threats, a familiar foe has resurfaced with renewed sophistication. Glassworm malware, first identified in October 2025, has made a comeback, embedding itself in Visual Studio Code extensions and exploiting developers’ trust in open-source tools. This self-propagating worm uses invisible Unicode characters to conceal malicious code, evading detection by both human reviewers and automated scanners. According to The Hacker News, the latest wave involves three compromised extensions on the OpenVSX marketplace, amassing thousands of installations and posing a significant risk to the software supply chain.

The malware’s ingenuity lies in its use of Unicode variation selectors, which render as blank spaces but hide executable code. This technique allows Glassworm to propagate autonomously, stealing credentials, compromising systems, and even draining cryptocurrency wallets. Security firm Koi Security, as reported by iTnews, detected anomalous behavior in extensions like CodeJoy, highlighting how the worm targets popular developer environments such as VS Code, which boasts millions of users worldwide.

The Mechanics of Invisibility

Delving deeper into Glassworm’s tactics, the malware employs a multi-stage infection process. Upon installation, it scans for vulnerabilities in connected systems, using Solana blockchain for command-and-control communications—a novel twist that leverages decentralized networks for persistence. The Hacker News detailed how the worm infected 14 extensions in its initial outbreak, leading to over 35,800 downloads and the compromise of 49 cryptocurrency wallets.

Researchers from Truesec, in their blog post on Truesec, noted that seven OpenVSX extensions were hijacked on October 17, 2025, with ten still distributing malware at the time of discovery. This self-replication capability mimics biological worms, allowing Glassworm to spread across developer machines and potentially into corporate networks, amplifying the threat to critical infrastructure.

Resurgence and New Targets

The recent resurgence, as covered by BleepingComputer, introduces three new malicious extensions: ai-driven-dev.ai-driven-dev, yasuyuky.transient-emacs, and adhamu.history-in-sublime-merge. These have collectively garnered over 10,000 downloads, employing the same Unicode obfuscation to embed code that targets NPM, GitHub, and crypto-related extensions. Posts on X from cybersecurity accounts like Koidex emphasize the attack’s persistence, with one stating, ‘GlassWorm strikes again… ~10K additional infections. Same attack pattern: malicious code hidden.’

Dark Reading’s analysis in Dark Reading describes Glassworm as a sophisticated worm that has infected nearly 36,000 machines, using invisible code to steal credentials and enable lateral movement within networks. This evolution underscores a shift in supply-chain attacks, where attackers exploit the decentralized nature of extension marketplaces like OpenVSX and Microsoft’s Visual Studio Code registry.

Blockchain’s Role in Command and Control

One of Glassworm’s most innovative features is its integration with the Solana blockchain for C2 operations, allowing it to revive itself even after detection. As explained in Cyberpress, this marks Glassworm as the world’s first worm specifically targeting VS Code extensions, blending traditional malware techniques with modern blockchain resilience. The malware not only steals sensitive data but also propagates by compromising developer credentials to upload further infected extensions.

Rescana’s report on Rescana highlights the executive summary of the re-emergence, noting advanced obfuscation methods that have evaded standard security measures. Industry insiders point out that this tactic exploits the trust developers place in open-source ecosystems, where rapid adoption of extensions can lead to widespread vulnerabilities.

Impact on Developers and Businesses

The broader implications for the tech industry are profound. With VS Code being a staple in development workflows, infections can cascade into enterprise environments, potentially exposing proprietary code and intellectual property. Medium articles, such as one by IT_Engineer on Medium, warn that Glassworm represents a new supply-chain threat, escalating risks for developers and businesses alike.

OpenVSX has downplayed the impact, as per CyberSecurityCue, but rapid reviews and takedowns have been initiated. However, the worm’s ability to resurface suggests ongoing challenges in securing decentralized marketplaces. X posts from Security Harvester echo this, with updates like ‘GlassWorm Returns: New Wave Strikes as We Expose Attacker Infrastructure,’ indicating community efforts to track and mitigate the threat.

Defensive Strategies and Future Outlook

To combat Glassworm, experts recommend enhanced vetting of extensions, including dynamic analysis and blockchain monitoring. Truesec advises developers to verify extension publishers and monitor for unusual network activity, particularly involving Solana endpoints. As iTnews quotes Koi Security researchers, ‘Glassworm is one of the most advanced software supply chain attacks seen so far.’

Looking ahead, the cybersecurity community must adapt to these hybrid threats that blend code obfuscation with emerging technologies. BleepingComputer’s coverage emphasizes the need for collaborative defenses, as individual takedowns may not suffice against a self-propagating adversary. With ongoing detections reported on X, such as from Infosec Alevski sharing The Hacker News articles, vigilance remains key in safeguarding the developer ecosystem.

Evolving Threat Landscape

As Glassworm continues to evolve, its tactics could inspire copycat attacks across other IDEs and marketplaces. The integration of blockchain for C2 not only enhances stealth but also complicates attribution, making it harder for law enforcement to trace perpetrators. Dark Reading notes that the worm’s focus on credential theft positions it as a gateway for larger breaches, potentially leading to ransomware deployments or data exfiltration.

Industry responses include calls for standardized security protocols in extension registries. Medium’s Data And Beyond piece describes how Glassworm infected 35,000 machines, labeling it ‘The VS Code Trojan’ and urging developers to adopt multi-factor authentication and regular audits. This incident serves as a wake-up call for the tech sector to prioritize supply-chain integrity amid rising sophisticated threats.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us