Glassworm Malware Strikes Again

Glassworm Malware Strikes Again: Third Wave Targets Visual Studio Code Developers

Glassworm malware campaign, a sophisticated supply chain attack that specifically targets developers utilizing the Visual Studio Code extension marketplaces, including OpenVSX and Microsoft. This latest wave of malware evades platform security by employing advanced obfuscation techniques, notably using invisible Unicode characters and pushing malicious code through updates after initial approval. Once active, Glassworm’s primary function is credential theft, harvesting authentication tokens for GitHub, npm, and other developer accounts, while also targeting dozens of cryptocurrency wallets. The malware further establishes persistent access by deploying SOCKS proxies and HVNC (Hidden Virtual Network Computing) clients, granting attackers undetected remote control over the compromised development environment. Utilizing the urgency of this threat, the text concludes with a promotional section from Technijian, a managed IT services provider, marketing its specialized cybersecurity, security training, and comprehensive defense strategies to businesses in Southern California. ... Read More
Sophisticated NPM Attack

Sophisticated NPM Attack: Cross-Platform Infostealer Targets Developer Systems

A highly sophisticated supply chain attack that infiltrated the npm registry using ten malicious packages, exposing thousands of developers to credential theft. This attack was successful due to typosquatting and the use of a four-layer code obfuscation strategy that bypassed traditional security tools for nearly four months. The cross-platform infostealer targeted Windows, Linux, and macOS systems to harvest critical developer credentials, including SSH keys, API tokens, browser cookies, and system passwords, posing a severe risk to corporate infrastructure. The text concludes by outlining immediate remediation steps and promoting Technijian's comprehensive security services designed to protect development environments against such complex supply chain threats and assist with incident response. ... Read More