Click any tag below to further narrow down your results
Links
A new malware called GlassWorm has been discovered targeting macOS systems through compromised OpenVSX extensions. The attack, which involved pushing malicious updates to four extensions, aims to steal passwords, crypto-wallet data, and developer credentials. Users who downloaded the affected extensions should clean their systems and change their passwords.
This article discusses a security flaw in popular AI IDEs like Cursor and Windsurf, which recommended non-existent extensions from Microsoft’s marketplace. The authors proactively claimed vulnerable namespaces on OpenVSX to prevent malicious uploads, securing the environment for developers.
The Glassworm malware campaign has resurfaced with 24 new malicious packages on OpenVSX and the Microsoft Visual Studio Marketplace. This malware uses hidden code to steal developer credentials and cryptocurrency data while providing remote access to attackers. Despite prior containment efforts, it continues to evade detection and reappear on these platforms.
AI-driven IDEs like Cursor and Google Antigravity recommend extensions that may not exist in the OpenVSX registry. This gap allows malicious actors to claim unregistered namespaces and potentially distribute malware. Researchers have reported the issue and taken steps to prevent exploitation.
A supply-chain attack named GlassWorm is targeting developers on the OpenVSX and Microsoft Visual Studio marketplaces, leading to an estimated 35,800 installations of self-spreading malware. Utilizing invisible characters to hide its code, GlassWorm steals credentials and cryptocurrency wallet information, while employing the Solana blockchain for command-and-control, making it challenging to dismantle. Researchers have identified multiple infected extensions and warn of the malware's sophisticated nature, marking it as a significant threat to developer environments.