New GlassWorm attack targets macOS via compromised OpenVSX extensions
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,抓住主要信息。 文章讲的是GlassWorm恶意软件通过OpenVSX扩展传播,主要窃取macOS系统的密码、加密钱包数据和开发者凭证。攻击者入侵了一个合法开发者的账户,发布了恶意更新,影响了四个扩展,下载量高达22,000次。恶意软件隐藏代码使用Unicode字符,并支持远程访问和代理功能。 此外,GlassWorm还针对macOS系统,并试图替换Trezor和Ledger应用。Socket团队报告了这次攻击,并提到恶意软件排除了俄语环境的系统。最后,受影响的扩展已被移除,建议用户清理系统并更换密码。 总结的时候要简洁明了,涵盖攻击方式、目标、影响和后果。确保不超过100字,并且直接描述内容。 </think> GlassWorm恶意软件通过篡改OpenVSX扩展传播,窃取macOS用户的密码、加密钱包数据及开发者凭证。攻击者入侵合法开发者账户oorzc,发布恶意更新至四款扩展。该恶意软件隐藏代码并支持远程访问和代理功能。 2026-2-2 22:15:15 Author: www.bleepingcomputer.com(查看原文) 阅读量:1 收藏

New GlassWorm attack targets macOS via compromised OpenVSX extensions

A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems.

The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times.

GlassWorm attacks first appeared in late October, hiding the malicious code using “invisible” Unicode characters to steal cryptocurrency wallet and developer account details. The malware also supports VNC-based remote access and SOCKS proxying.

Wiz

Over time and across multiple attack waves, GlassWorm impacted both Microsoft’s official Visual Studio Code marketplace and its open-source alternative for unsupported IDEs, OpenVSX.

In a previous campaign, GlassWorm showed signs of evolution, targeting macOS systems, and its developers were working to add a replacement mechanism for the Trezor and Ledger apps.

A new report from Socket’s security team describes a new campaign that relied on trojanizing the following extensions:

  • oorzc.ssh-tools v0.5.1
  • oorzc.i18n-tools-plus v1.6.8
  • oorzc.mind-map v1.0.61
  • oorzc.scss-to-css-compile v1.3.4

The malicious updates were pushed on January 30, and Socket reports that the extensions had been innocuous for two years. This suggests that the oorzc account was most likely compromised by GlassWorm operators.

According to the researchers, the campaign targets macOS systems exclusively, pulling instructions from Solana transaction memos. Notably, Russian-locale systems are excluded, which may hint at the origin of the attacker.

Environment checks before executing on the host
Environment checks before executing on the host
Source: Socket

GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login.

It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251.

Data theft activity
Data theft activity
Source: Socket

Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases.

The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases.

Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/new-glassworm-attack-targets-macos-via-compromised-openvsx-extensions/
如有侵权请联系:admin#unsafe.sh