home.social

#glassworm — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #glassworm, aggregated by home.social.

  1. GlassWorm muta ancora: 73 estensioni “sleeper” su Open VSX pronte a svegliarsi come malware

    La campagna GlassWorm torna con 73 nuove estensioni dormanti sul marketplace Open VSX. Socket ha rilevato nuove attivazioni malware da estensioni che erano parse innocue per settimane: un escalation preoccupante per l'intera pipeline di sviluppo software.

    insicurezzadigitale.com/glassw

  2. GlassWorm: il worm che infetta tutti gli IDE tramite un’estensione OpenVSX contraffatta

    Un dropper compilato in Zig si propaga da un'estensione fake WakaTime su OpenVSX verso tutti gli IDE VS Code-compatibili presenti sulla macchina, deployando un RAT con C2 su blockchain Solana e un'estensione Chrome per il furto di sessioni. Analisi tecnica completa della campagna GlassWorm.

    insicurezzadigitale.com/glassw

  3. ForceMemo: malware ukrywany w repozytoriach przez force-push

    Badacze bezpieczeństwa z StepSecurity odkryli nową kampanię malware, w której atakujący przejmuje masowo konta programistów na GitHub i wstrzykuje złośliwe oprogramowanie do setek repozytoriów. Pierwszą aktywność odnotowano 8 marca 2026 roku, ale według ustaleń badaczy kampania wciąż trwa i przejmowane są kolejne repozytoria. Kampania – nazwana przez badaczy ForceMemo –...

    #Aktualności #Github #Glassworm #Malware

    sekurak.pl/forcememo-malware-u

  4. Tiens, plot twist ! le bouzin pivote vers windows

    "On March 16, a new Solana memo appeared on the published #GlassWorm wallet (28PKnu, documented by Truesec in October 2025) at 11:42 UTC with a kill-switch toggle set to OFF and a live payload URL. The campaign had reactivated. The payload was not the macOS stealer from Parts 1 and 2. It was a 202KB JavaScript file targeting Windows, bundling native DLLs, a Chrome browser extension disguised as "Google Docs Offline", a DPAPI credential dumper, and exfiltration to a previously unseen server."
    👇
    codeberg.org/tip-o-deincognito

  5. 🚨 Oh no! The dreaded #Glassworm is back, like a transparent hacker on a mission to confuse developers with invisible #Unicode attacks. With 150 #GitHub repositories compromised, the solution is a dizzying list of acronyms and jargon that promises to protect your code, but only if you squint hard enough to see it! 🐛🔍 #SecurityTheater
    aikido.dev/blog/glassworm-retu #InvisibleAttacks #SecurityThreat #DeveloperConfusion #HackerNews #ngated

  6. When I say "IT mostly just runs in circles" I mean it: arstechnica.com/security/2026/

    This article from 2026 describes something I've been fighting with ~17 years ago. Sure, slightly more clever payload and different delivery method, but in principle nothing new: github.com/MichalBryxi/Apache-

    #Glassworm #Unicode #InvisibleCharacters #Whitespace #Hack

  7. RE: infosec.exchange/@_r_netsec/11

    Waah, joli boulot.
    Je me demande qui en est l’auteur.

    lecture technique très intéressante.
    Une analyse statique complétée par du monitoring comportementale réseau qui plonge dans les entrailles du ver infostealer macOS injecté dans un plugin VS Code lors de la campagne Glassworm v2.. 👀

    C’est balaise et résilient, avec une belle répartition des tâches de vol entre AppleScript et Node.js. :amaze:

    Les échantillons déobfusqués ont aussi été mis à disposition sur #malwarebazaar

    bazaar.abuse.ch/sample/d72c1c7

    #CyberVeille #MacSecurity #macOS #Malware #ThreatIntel #Glassworm
    👇

  8. GlassWorm has resurfaced with 24 malicious extensions posing as popular developer tools across Visual Studio Marketplace and Open VSX. The campaign uses Rust implants, Solana-based C2, and inflated download stats to slip harmful updates into trusted environments.

    This wave shows how supply-chain attacks continue evolving by blending seamlessly into developer workflows.

    What protections do you think dev ecosystems should prioritize next?

    Follow us for consistent, unbiased cybersecurity coverage.

    #infosec #glassworm #supplychainsecurity #devsecops #vscode #openvsx #malware #threatintel #securityresearch #technadu

  9. GlassWorm – nowy, “niewidzialny” atak na łańcuch dostaw

    W połowie września pisaliśmy o ataku na łańcuch dostaw – Shai-Hulud – który zresztą nie był jedynym w środowisku npm. Dziś mamy do czynienia z kolejną kampanią typu supply chain attack. TLDR: GlassWorm, bo o nim mowa, nie jest typowym atakiem na łańcuch dostaw. Wykorzystuje on bowiem niewidoczne znaki Unicode....

    #WBiegu #Atak #Glassworm #Malware #SupplyChain

    sekurak.pl/glassworm-nowy-niew

  10. The DevOps space is under siege.
    GlassWorm, a self-propagating worm in VS Code extensions, uses Solana blockchain for C2, invisible Unicode for stealth, and targets developer credentials, crypto wallets, and Git repositories. Auto-updating extensions make the threat persistent.
    💬 InfoSec pros: how should organizations defend against this evolving supply chain risk?
    🔁 Share & follow TechNadu for expert analysis on emerging malware and blockchain-enabled attacks.

    #GlassWorm #VSCode #SupplyChainAttack #DevSecOps #BlockchainSecurity #Malware #InfoSec #DeveloperSecurity #CyberThreats #TechNews

  11. The DevOps space is under siege.
    GlassWorm, a self-propagating worm in VS Code extensions, uses Solana blockchain for C2, invisible Unicode for stealth, and targets developer credentials, crypto wallets, and Git repositories. Auto-updating extensions make the threat persistent.
    💬 InfoSec pros: how should organizations defend against this evolving supply chain risk?
    🔁 Share & follow TechNadu for expert analysis on emerging malware and blockchain-enabled attacks.

    #GlassWorm #VSCode #SupplyChainAttack #DevSecOps #BlockchainSecurity #Malware #InfoSec #DeveloperSecurity #CyberThreats #TechNews

  12. The DevOps space is under siege.
    GlassWorm, a self-propagating worm in VS Code extensions, uses Solana blockchain for C2, invisible Unicode for stealth, and targets developer credentials, crypto wallets, and Git repositories. Auto-updating extensions make the threat persistent.
    💬 InfoSec pros: how should organizations defend against this evolving supply chain risk?
    🔁 Share & follow TechNadu for expert analysis on emerging malware and blockchain-enabled attacks.

    #GlassWorm #VSCode #SupplyChainAttack #DevSecOps #BlockchainSecurity #Malware #InfoSec #DeveloperSecurity #CyberThreats #TechNews

  13. The DevOps space is under siege.
    GlassWorm, a self-propagating worm in VS Code extensions, uses Solana blockchain for C2, invisible Unicode for stealth, and targets developer credentials, crypto wallets, and Git repositories. Auto-updating extensions make the threat persistent.
    💬 InfoSec pros: how should organizations defend against this evolving supply chain risk?
    🔁 Share & follow TechNadu for expert analysis on emerging malware and blockchain-enabled attacks.

    #GlassWorm #VSCode #SupplyChainAttack #DevSecOps #BlockchainSecurity #Malware #InfoSec #DeveloperSecurity #CyberThreats #TechNews

  14. The DevOps space is under siege.
    GlassWorm, a self-propagating worm in VS Code extensions, uses Solana blockchain for C2, invisible Unicode for stealth, and targets developer credentials, crypto wallets, and Git repositories. Auto-updating extensions make the threat persistent.
    💬 InfoSec pros: how should organizations defend against this evolving supply chain risk?
    🔁 Share & follow TechNadu for expert analysis on emerging malware and blockchain-enabled attacks.

    #GlassWorm #VSCode #SupplyChainAttack #DevSecOps #BlockchainSecurity #Malware #InfoSec #DeveloperSecurity #CyberThreats #TechNews

  15. 🚨 First-ever self-propagating #GlassWorm malware is targeting developers via the #OpenVSX marketplace, hijacking VSCode extensions, stealing credentials and using the #Solana blockchain for control. 🔐

    Read: hackread.com/glassworm-malware

    #Cybersecurity #SupplyChainAttack #Malware #VSCode #Malware