17.6 C
Canberra
Wednesday, March 18, 2026

GlassWorm malware hits 400+ code repos on GitHub, npm, VSCode, OpenVSX


GlassWorm malware hits 400+ code repos on GitHub, npm, VSCode, OpenVSX

The GlassWorm supply-chain marketing campaign has returned with a brand new, coordinated assault that focused a whole bunch of packages, repositories, and extensions on GitHub, npm, and VSCode/OpenVSX extensions.

Researchers at Aikido, Socket, Step Safety, and the OpenSourceMalware group have collectively recognized 433 compromised parts this month in assaults attributed to GlassWorm.

Proof of a single risk actor operating the GlassWorm campaigns throughout a number of open-source repositories is offered by way of the identical Solana blockchain handle used for command-and-control (C2) exercise, equivalent or functionally related payloads, and shared infrastructure.

GlassWorm was first noticed final October, with attackers utilizing “invisible” Unicode characters to cover malicious code that harvested cryptocurrency pockets information and developer credentials.

The marketing campaign continued with a number of waves and expanded to Microsoft’s official Visible Studio Code market and the OpenVSX registry utilized by unsupported IDEs, as found by Safe Annex’s researcher, John Tuckner.

macOS programs had been additionally focused, introducing trojanized shoppers for Trezor and Ledger, and later focused builders by way of compromised OpenVSX extensions.

The newest GlassWorm assault wave is much extra in depth, although, and unfold to:

  • 200 GitHub Python repositories
  • 151 GitHub JS/TS repositories
  • 72 VSCode/OpenVSX extensions
  • 10 npm packages

Preliminary compromise happens on GitHub, the place accounts are compromised to force-push malicious commits.

Then, malicious packages and extensions are printed on npm and VSCode/OpenVSX, that includes obfuscated code (invisible Unicode characters) to evade detection.

Malicious package on OpenVSX
Malicious bundle on OpenVSX
Supply: Aikido

Throughout all platforms, the Solana blockchain is queried each 5 seconds for brand new directions. In line with Step Safety, between November 27, 2025, and March 13, 2026, there have been 50 new transactions, principally to replace the payload URL.

The directions had been embedded as memos within the transactions and led to downloading the Node.js runtime and executing a JavaScript-based info stealer. 

GlassWorm attack chain
GlassWorm assault chain
Supply: Step Safety

The malware targets cryptocurrency pockets information, credentials, and entry tokens, SSH keys, and developer setting information.

Evaluation of code feedback signifies that GlassWorm is orchestrated by Russia-speaking risk actors. Moreover, the malware skips execution if the Russian locale is discovered on the system. Nonetheless, that is inadequate information for assured attribution.

Step Safety advises builders who set up Python packages straight from GitHub or run cloned repositories to examine for indicators of compromise by looking their codebase for the marker variable “lzcdrtfxyqiplpd,” an indicator of the GlassWorm malware.

Malicious GitHub files
Malicious GitHub information
Supply: Step Safety

Additionally they advocate inspecting programs for the presence of the ~/init.json file, which is used for persistence, in addition to surprising Node.js installations within the house listing (e.g., ~/node-v22*).

Moreover, builders ought to search for suspicious i.js information in not too long ago cloned tasks and evaluation Git commit histories for anomalies, resembling commits the place the committer date is considerably newer than the unique creator date.

Malware is getting smarter. The Crimson Report 2026 reveals how new threats use math to detect sandboxes and conceal in plain sight.

Obtain our evaluation of 1.1 million malicious samples to uncover the highest 10 strategies and see in case your safety stack is blinded.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

[td_block_social_counter facebook="tagdiv" twitter="tagdivofficial" youtube="tagdiv" style="style8 td-social-boxed td-social-font-icons" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjM4IiwiZGlzcGxheSI6IiJ9LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9" custom_title="Stay Connected" block_template_id="td_block_template_8" f_header_font_family="712" f_header_font_transform="uppercase" f_header_font_weight="500" f_header_font_size="17" border_color="#dd3333"]
- Advertisement -spot_img

Latest Articles