GlassWorm Malware Plants 73 Sleeper Extensions in OpenVSX to Steal Crypto Wallets

Gate News message, April 28 — Security researchers have identified 73 malicious extensions planted by GlassWorm malware in OpenVSX’s registry, with six already activated to steal developers’ cryptocurrency wallets and credentials. The extensions were uploaded as fake copies of legitimate listings, with malicious code injected through later updates.

GlassWorm first emerged in October 2025, using invisible Unicode characters to hide code targeting crypto wallet data and developer credentials. The campaign has since spread across npm packages, GitHub repositories, Visual Studio Code Marketplace, and OpenVSX. In mid-March 2026, a major wave affected hundreds of repositories and dozens of extensions, prompting intervention from multiple security research groups. The attackers employ a delayed activation strategy, initially distributing clean extensions to build an install base before deploying malware through updates. Socket researchers identified three delivery methods: loading a second VSIX package from GitHub via CLI commands, deploying platform-specific compiled modules like .node files containing core malicious logic, and using heavily obfuscated JavaScript that decodes at runtime to download and install malicious payloads.

The threat extends beyond OpenVSX. On April 22, the npm registry briefly hosted a malicious version of Bitwarden’s CLI under the official package name for 93 minutes. The compromised package stole GitHub tokens, npm tokens, SSH keys, AWS and Azure credentials, and GitHub Actions secrets. Bitwarden, which serves over 10 million users across more than 50,000 businesses, confirmed the connection to a broader campaign tracked by Checkmarx researchers. Supply chain attacks exploit the time lag between package publication and content verification; Sonatype reported approximately 454,600 malicious packages infesting registries in 2025.

Socket recommends developers who installed any of the 73 flagged OpenVSX extensions rotate all secrets and clean their development environments. Security observers are monitoring whether the remaining 67 dormant extensions activate in coming days and whether OpenVSX implements stricter review controls for extension updates.

免責聲明:本頁面資訊可能來自第三方,不代表 Gate 的觀點或意見。頁面顯示的內容僅供參考,不構成任何財務、投資或法律建議。Gate 對資訊的準確性、完整性不作保證,對因使用本資訊而產生的任何損失不承擔責任。虛擬資產投資屬高風險行為,價格波動劇烈,您可能損失全部投資本金。請充分了解相關風險,並根據自身財務狀況和風險承受能力謹慎決策。具體內容詳見聲明

相關文章

Carrot DeFi 平台因 $285M Drift Protocol 漏洞遭遇首例受害者而關閉

根據 Carrot 在 4 月 30 日的公告,這個以 Solana 為基礎的 DeFi 收益協議將永久關閉,成為首個因 4 月初的價值 2.85 億美元的 Drift Protocol 事件而直接宣布停閉的平台。Carrot 團隊在一則 X 貼文中表示,這次 Drift 駭客事件是

GateNews9分鐘前

加密勒索攻擊在 4 月達到歷史新高,出現 20+ 起漏洞事件,損失超過 6 億美元

根據 DeFi Llama,截至 4 月,加密貨幣駭客攻擊的數量創下新高,超過 20 起資安漏洞利用,使其成為加密史上以事件數計算最常遭受攻擊的月份。總損失超過 6 億美元,其中 KelpDAO 的 2.92 億美元漏洞利用,以及 Drift Protocol 的 2.8 億美元駭擊,排名為前幾名(截至當時為止的)

GateNews5小時前

北韓間諜鎖定 $285M 盜竊行動中的 Drift

## Drift 竊取行動 根據報導,由北韓國家支持的間諜進行了親自到場的行動,針對加密貨幣平台 Drift 進行竊取,意圖掏空 2.85 億美元。該行動包含數月對目標的直接接觸。 ## 更廣泛的北韓網路威脅 根據一份說法,

Crypto Frontier7小時前

Purrlend 於 4 月 25 日在 HyperEVM 和 MegaETH 之間遭遇 152 萬美元的資安漏洞入侵

根據 Purrlend 的官方事件報告,4 月 25 日,該協議遭遇安全漏洞入侵,HyperEVM 與 MegaETH 部署合計約損失 152 萬美元。攻擊者入侵了 2/3 多重簽名錢包,並授予自己管理員權限,包括

GateNews7小時前

Polymarket 尋求 150 億美元估值與 CFTC 核准,同時邀請 Chainalysis 協助打擊內線交易並提告警方

根據 The Block,Polymarket 已在週四聘請 Chainalysis,協助偵辦內線交易與市場操縱,因為該預測市場正努力籌集 4 億美元,並以 150 億美元的估值尋求重新上線,且取得美國商品期貨交易委員會(CFTC)的批准。

GateNews8小時前
留言
0/400
暫無留言