#Glassworm

2026-01-09
Alex JimenezAlexJimenez@mas.to
2026-01-02

New #GlassWorm #Malware wave targets Macs with trojanized crypto wallets

The GlassWorm malware first appeared on the marketplaces in October, hidden inside malicious extensions using "invisible" Unicode characters.

bleepingcomputer.com/news/secu

#CyberSecurity

2026-01-02

📢 GlassWorm : 4e vague visant des développeurs macOS via des extensions VSCode/OpenVSX piégées
📝 Selon BleepingComputer, une quatrième vague de la campagne GlassWorm cibl...
📖 cyberveille : cyberveille.ch/posts/2026-01-0
🌐 source : bleepingcomputer.com/news/secu
#GlassWorm #IOC #Cyberveille

2025-12-07

⚠️ Glassworm malware exploits Discord DCN for delivery #Glassworm is a modular #malware abusing Discord’s CDN to spread, using .lnk loaders and multi-stage payloads to steal data, log keystrokes and maintain persistence. Researchers warn of rapid evolution and broad targeting. #ransomNews #malware

2025-12-03

GlassWorm has resurfaced with 24 malicious extensions posing as popular developer tools across Visual Studio Marketplace and Open VSX. The campaign uses Rust implants, Solana-based C2, and inflated download stats to slip harmful updates into trusted environments.

This wave shows how supply-chain attacks continue evolving by blending seamlessly into developer workflows.

What protections do you think dev ecosystems should prioritize next?

Follow us for consistent, unbiased cybersecurity coverage.

#infosec #glassworm #supplychainsecurity #devsecops #vscode #openvsx #malware #threatintel #securityresearch #technadu

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools
2025-12-02

📢 Glassworm: troisième vague sur OpenVSX et Visual Studio avec 24 nouveaux packages malveillants
📝 Selon BleepingComputer, la **campagne Glassworm**, apparue en **octob...
📖 cyberveille : cyberveille.ch/posts/2025-12-0
🌐 source : bleepingcomputer.com/news/secu
#Glassworm #IOC #Cyberveille

Karsten Schmidttoxi@mastodon.thi.ng
2025-11-18

#LazyWeb question regarding the dreaded NPM #GlassWorm or similar malware to harvest auth tokens:

To avoid a potential infection leading to harvesting the token usually stored in `~/.npmrc`, I changed that file's content to:

`//registry.npmjs.org/:_authToken=${NPM_TOKEN}`

...and now only keep an ephemeral `NPM_TOKEN` env var when I need it. Are there any better approaches? What are you doing as prophylaxis?

#NPM #JavaScript #Infosec

2025-11-10

📢 La campagne GlassWorm revient avec trois extensions VSCode malveillantes (10 000+ téléchargements)
📝 Selon l’article, la campagne de malware GlassWorm, qui avait pr...
📖 cyberveille : cyberveille.ch/posts/2025-11-1
🌐 source : bleepingcomputer.com/news/secu
#GlassWorm #OpenVSX #Cyberveille

2025-11-10

GlassWorm Returns: New Wave Strikes as We Expose Attacker Infrastructure
#GlassWorm
koi.ai/blog/glassworm-returns-

2025-11-08

GlassWorm malware is evolving—using invisible code tricks to sneak into GitHub, NPM, and beyond. Could your favorite dev tools be next in its global pursuit? Read more to find out.

thedefendopsdiaries.com/glassw

#glassworm
#malwarecampaign
#cybersecurity
#obfuscation
#vscodeextensions

2025-11-08

GlassWorm is turning trusted VS Code extensions into stealthy attack vectors—using invisible Unicode tricks and blockchain commands to self-propagate. Could your code be next?

thedefendopsdiaries.com/glassw

#glassworm
#vscode
#supplychainsecurity
#malware
#blockchainsecurity

Eylul Blossom Gameseylulblossomgames
2025-11-06

Esto es una demostración del uso de caracteres Unicode invisibles para ofuscar el código y luego ejecutarlo.

Se ofrece esta información con fines educativos, para entender cómo funciona y protegerse, no para malos usos.

La demostración:

codeberg.org/eylulblossomgames

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst