
A brand new GlassWorm malware assault by compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet information, and developer credentials and configurations from macOS techniques.
The risk actor gained entry to the account of a respectable developer (oorzc) and pushed malicious updates with the GlassWorm payload to 4 extensions that had been downloaded 22,000 occasions.
GlassWorm assaults first appeared in late October, hiding the malicious code utilizing “invisible” Unicode characters to steal cryptocurrency pockets and developer account particulars. The malware additionally helps VNC-based distant entry and SOCKS proxying.
Over time and throughout a number of assault waves, GlassWorm impacted each Microsoft’s official Visible Studio Code market and its open-source various for unsupported IDEs, OpenVSX.
In a earlier marketing campaign, GlassWorm confirmed indicators of evolution, focusing on macOS techniques, and its builders have been working so as to add a alternative mechanism for the Trezor and Ledger apps.
A new report from Socket’s safety group describes a brand new marketing campaign that relied on trojanizing the next extensions:
- oorzc.ssh-tools v0.5.1
- oorzc.i18n-tools-plus v1.6.8
- oorzc.mind-map v1.0.61
- oorzc.scss-to-css-compile v1.3.4
The malicious updates have been pushed on January 30, and Socket studies that the extensions had been innocuous for 2 years. This means that the oorzc account was most probably compromised by GlassWorm operators.
In accordance with the researchers, the marketing campaign targets macOS techniques solely, pulling directions from Solana transaction memos. Notably, Russian-locale techniques are excluded, which can trace on the origin of the attacker.

Supply: Socket
GlassWorm hundreds a macOS info stealer that establishes persistence on contaminated techniques by way of a LaunchAgent, enabling execution at login.
It harvests browser information throughout Firefox and Chromium, pockets extensions and pockets apps, macOS keychain information, Apple Notes databases, Safari cookies, developer secrets and techniques, and paperwork from the native filesystem, and exfiltrates every little thing to the attacker’s infrastructure at 45.32.150[.]251.

Supply: Socket
Socket reported the packages to the Eclipse Basis, the operator of the Open VSX platform, and the safety group confirmed unauthorized publishing entry, revoked tokens, and eliminated the malicious releases.
The one exception is oorzc.ssh-tools, which was eliminated utterly from Open VSX on account of discovering a number of malicious releases.
Presently, variations of the affected extensions in the marketplace are clear, however builders who downloaded the malicious releases ought to carry out a full system clean-up and rotate all their secrets and techniques and passwords.

