GlassWorm Malware Targets Developers via OpenVSX Marketplace – Hackread – Your Source for Cybersecurity News, Data Breaches, Tech, AI, Crypto, and More

A recent cyber threat known as GlassWorm has been detected, specifically targeting developers utilizing Visual Studio Code extensions via the OpenVSX marketplace. Koi Security unveiled this campaign, which leverages trusted extensions to automatically propagate across various development environments while employing stolen credentials to facilitate further infections.

Distinct from typical malware targeting end-user applications, GlassWorm embeds itself within commonly used development tools, particularly preying on extensions that developers rely on. This insidious approach enables the malware to take command of these extensions rather than directly attacking applications their developers are creating.

Once operational, GlassWorm extracts sensitive credentials from platforms such as NPM, GitHub, and Git, siphons funds from 49 distinct cryptocurrency wallets, and deploys covert VNC and SOCKS proxies to ensure continued access and control. Through these tactics, the malware poses a considerable risk to development environments.

GlassWorm Malware Targets Developers Through OpenVSX Marketplace
One of the malicious extensions of the marketplace (Image via Koi)

Researchers uncovered that GlassWorm conceals its harmful payload using invisible Unicode variation selectors, rendering the malicious code nearly imperceptible to human reviewers and many automated security tools. This sophisticated evasion technique enables the malware to slip through standard code reviews, allowing it to proliferate undetected within other extensions.

The command-and-control infrastructure employed by GlassWorm is also highly atypical. Rather than relying on conventional remote servers, it operates via the Solana blockchain, complicating efforts to track or dismantle its operations. In the event that the Solana network fails, the attackers have established Google Calendar as a backup communication channel, enhancing their control mechanisms.

GlassWorm Malware Targets Developers Through OpenVSX Marketplace
Malicious Google Calendar invite (Image via Koi)

Koi Security has indicated that over 35,800 installations have been compromised, with at least ten affected extensions still operational on the OpenVSX marketplace as of this week. Ongoing investigations are focused on identifying and purging all infected components from the platform.

Dale Hoak, Chief Information Security Officer at RegScale, underscored the implications of this incident for compliance within the open-source ecosystem. He stated that software supply chain attacks have evolved to target vital tools and dependencies that developers rely on, rather than just end products. Hoak urged organizations to prioritize continuous monitoring and automation across their development pipelines to identify unauthorized alterations in real-time.

Compliance, he warned, must not be seen as a checkbox exercise. Controls ensuring the integrity of the software supply chain need to be integrated into CI/CD pipelines, with ongoing validation and provenance tracking as standard protocol. He added that when threats like GlassWorm arise, teams should already possess the documentation of continuous compliance as well as the ability for immediate response.

The emergence of GlassWorm within OpenVSX illustrates that developers are increasingly becoming prime targets for attackers. Consequently, it is essential for organizations to thoroughly verify every extension, routinely audit their dependencies, and monitor for any unusual network or credential activity.

Source link