GlassWorm Malware Plants 73 Sleeper Extensions in OpenVSX to Steal Crypto Wallets

Gate News message, April 28 — Security researchers have identified 73 malicious extensions planted by GlassWorm malware in OpenVSX’s registry, with six already activated to steal developers’ cryptocurrency wallets and credentials. The extensions were uploaded as fake copies of legitimate listings, with malicious code injected through later updates.

GlassWorm first emerged in October 2025, using invisible Unicode characters to hide code targeting crypto wallet data and developer credentials. The campaign has since spread across npm packages, GitHub repositories, Visual Studio Code Marketplace, and OpenVSX. In mid-March 2026, a major wave affected hundreds of repositories and dozens of extensions, prompting intervention from multiple security research groups. The attackers employ a delayed activation strategy, initially distributing clean extensions to build an install base before deploying malware through updates. Socket researchers identified three delivery methods: loading a second VSIX package from GitHub via CLI commands, deploying platform-specific compiled modules like .node files containing core malicious logic, and using heavily obfuscated JavaScript that decodes at runtime to download and install malicious payloads.

The threat extends beyond OpenVSX. On April 22, the npm registry briefly hosted a malicious version of Bitwarden’s CLI under the official package name for 93 minutes. The compromised package stole GitHub tokens, npm tokens, SSH keys, AWS and Azure credentials, and GitHub Actions secrets. Bitwarden, which serves over 10 million users across more than 50,000 businesses, confirmed the connection to a broader campaign tracked by Checkmarx researchers. Supply chain attacks exploit the time lag between package publication and content verification; Sonatype reported approximately 454,600 malicious packages infesting registries in 2025.

Socket recommends developers who installed any of the 73 flagged OpenVSX extensions rotate all secrets and clean their development environments. Security observers are monitoring whether the remaining 67 dormant extensions activate in coming days and whether OpenVSX implements stricter review controls for extension updates.

免責聲明:本頁面資訊可能來自第三方,不代表 Gate 的觀點或意見。頁面顯示的內容僅供參考,不構成任何財務、投資或法律建議。Gate 對資訊的準確性、完整性不作保證,對因使用本資訊而產生的任何損失不承擔責任。虛擬資產投資屬高風險行為,價格波動劇烈,您可能損失全部投資本金。請充分了解相關風險,並根據自身財務狀況和風險承受能力謹慎決策。具體內容詳見聲明

相關文章

Bitcoin Core 礦工遠端執行程式碼漏洞,43% 節點未升級

據 Protos 於 5 月 5 日報道,Bitcoin Core 開發者在官方網站公開披露高危漏洞 CVE-2024-52911,該漏洞允許礦工透過挖掘特製區塊,遠端崩潰其他用戶的節點並在特定條件下執行程式碼。由於比特幣全節點升級為自願行為,目前估計仍有約 43% 的節點運行存在漏洞的舊版軟體。

Market Whisper17分鐘前

比特幣核心漏洞 CVE-2024-52911 允許遠端程式碼執行;仍有 43% 節點未修補

根據 Protos,Bitcoin Core 開發者最近披露了一項關鍵漏洞(CVE-2024-52911),影響 0.14.1 到 28.4 版本,允許礦工透過挖掘特別設計的區塊遠端崩潰節點並執行任意程式碼。該漏洞於 2024 年 11 月由開發者 Cory 發現

GateNews37分鐘前

Ekubo:EVM Swap 路由合約發生安全事件,Starknet 未受影響

根據 AMM 基礎設施 Ekubo 於 5 月 6 日在 X 平台發布的官方公告,Ekubo 在 EVM 鏈上的 Swap 路由合約發生安全事件。Ekubo 確認,流動性提供者(LP)及 Starknet 均未受到本次事件影響;團隊正在調查事件範圍,並準備事後分析報告。

Market Whisper49分鐘前

Kelp DAO 成首個棄用 LayerZero 主要協議,轉採 Chainlink CCIP

據 The Block 於 5 月 5 日報道,去中心化金融借貸協議 Kelp DAO 宣布棄用 LayerZero 作為跨鏈基礎設施提供商,改採 Chainlink 的跨鏈互通性協議(CCIP);Kelp DAO 是「自 LayerZero 漏洞事件發生以來第一個放棄 LayerZero 的主要協議」。

Market Whisper56分鐘前

Drift 宣布 2.95 億黑客事件恢復計劃,按損失賠償受攻擊錢包

根據 Drift Protocol 於 5 月 6 日在 X 平台發布的官方公告,Drift Protocol 正式推出針對 4 月 1 日黑客事件的用戶恢復計劃:每個受影響錢包將獲得「恢復代幣」(Recovery Token),每枚對應 1 美元的已驗證損失,作為對恢復池的按比例索賠憑證。

Market Whisper1小時前
留言
0/400
暫無留言