GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是一个名为GlassWorm的供应链攻击活动再次出现,影响了Microsoft Visual Studio Marketplace和Open VSX,发布了24个仿冒流行开发工具的扩展。这些扩展模仿了Flutter、React等工具,目的是窃取开发者的信息和加密资产。 接下来,攻击者利用被盗的凭证进一步传播恶意软件,甚至将开发者机器变成攻击节点。尽管微软和Open VSX一直在努力应对,但GlassWorm还是再次出现,并且攻击者还针对GitHub仓库。 最新的攻击中,24个扩展被发现,其中一些已经被移除。攻击者还通过虚增下载量来提高可信度。恶意代码在扩展激活后注入,使用Rust植入程序来感染Windows和macOS系统,并通过Solana区块链获取C2服务器信息。 总结时要包括攻击活动的名称、目标平台、受影响的扩展数量、模仿的工具、窃取的信息类型以及攻击者的策略等关键点。同时要保持简洁,在100字以内。 现在把这些信息浓缩成一段话:GlassWorm供应链攻击再次活跃,在两个市场发布24个仿冒扩展,模仿Flutter、React等工具,窃取开发者凭证和加密资产,并利用被盗凭证传播恶意软件。攻击者虚增下载量提高可信度,并使用Rust植入程序感染系统。 </think> GlassWorm供应链攻击再次活跃,在Microsoft Visual Studio Marketplace和Open VSX发布24个仿冒流行开发工具(如Flutter、React)的扩展,窃取开发者凭证和加密资产。攻击者利用被盗凭证传播恶意软件,并虚增下载量提高可信度。最新版本使用Rust植入程序感染Windows和macOS系统。 2025-12-2 15:1:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

The supply chain campaign known as GlassWorm has once again reared its head, infiltrating both Microsoft Visual Studio Marketplace and Open VSX with 24 extensions impersonating popular developer tools and frameworks like Flutter, React, Tailwind, Vim, and Vue.

GlassWorm was first documented in October 2025, detailing its use of the Solana blockchain for command-and-control (C2) and harvest npm, Open VSX, GitHub, and Git credentials, drain cryptocurrency assets from dozens of wallets, and turn developer machines into attacker-controlled nodes for other criminal activities.

The most crucial aspect of the campaign is the abuse of the stolen credentials to compromise additional packages and extensions, thereby spreading the malware like a worm. Despite continued efforts of Microsoft and Open VSX, the malware resurfaced a second time last month, and the attackers were observed targeting GitHub repositories.

The latest wave of the GlassWorm campaign, spotted by Secure Annex's John Tuckner, involves a total of 24 extensions spanning both repositories. The list of identified extensions is below -

Cybersecurity

VS Code Marketplace:

  • iconkieftwo.icon-theme-materiall
  • prisma-inc.prisma-studio-assistance (removed as of December 1, 2025)
  • prettier-vsc.vsce-prettier
  • flutcode.flutter-extension
  • csvmech.csvrainbow
  • codevsce.codelddb-vscode
  • saoudrizvsce.claude-devsce
  • clangdcode.clangd-vsce
  • cweijamysq.sync-settings-vscode
  • bphpburnsus.iconesvscode
  • klustfix.kluster-code-verify
  • vims-vsce.vscode-vim
  • yamlcode.yaml-vscode-extension
  • solblanco.svetle-vsce
  • vsceue.volar-vscode
  • redmat.vscode-quarkus-pro
  • msjsdreact.react-native-vsce

Open VSX:

  • bphpburn.icons-vscode
  • tailwind-nuxt.tailwindcss-for-react
  • flutcode.flutter-extension
  • yamlcode.yaml-vscode-extension
  • saoudrizvsce.claude-dev
  • saoudrizvsce.claude-devsce
  • vitalik.solidity

The attackers have been found to artificially inflate the download counts to make the extensions appear trustworthy and cause them to prominently appear in search results, often in close proximity to the actual projects they impersonate to deceive developers into installing them.

"Once the extension has been approved initially, the attacker seems to easily be able to update code with a new malicious version and easily evade filters," Tuckner said. "Many code extensions begin with an 'activate' context, and the malicious code is slipped in right after the activation occurs."

Cybersecurity

The new iteration, while still relying on the invisible Unicode trick, is characterized by the use of Rust-based implants that are packaged inside the extensions. In an analysis of the "icon-theme-materiall" extension, Nextron Systems said it comes with two Rust implants that are capable of targeting Windows and macOS systems -

  • A Windows DLL named os.node
  • A macOS dynamic library named darwin.node

As observed in the previous GlassWorm infections, the implants are designed to fetch details of the C2 server from a Solana blockchain wallet address and use it to download the next-stage payload, an encrypted JavaScript file. As a backup, they can parse a Google Calendar event to fetch the C2 address.

"Rarely does an attacker publish 20+ malicious extensions across both of the most popular marketplaces in a week," Tuckner said in a statement. "Many developers could easily be fooled by these extensions and are just one click away from compromise."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/12/glassworm-returns-with-24-malicious.html
如有侵权请联系:admin#unsafe.sh