GlassWorm Malware Plants 73 Sleeper Extensions in OpenVSX to Steal Crypto Wallets

Gate News message, April 28 — Security researchers have identified 73 malicious extensions planted by GlassWorm malware in OpenVSX’s registry, with six already activated to steal developers’ cryptocurrency wallets and credentials. The extensions were uploaded as fake copies of legitimate listings, with malicious code injected through later updates.

GlassWorm first emerged in October 2025, using invisible Unicode characters to hide code targeting crypto wallet data and developer credentials. The campaign has since spread across npm packages, GitHub repositories, Visual Studio Code Marketplace, and OpenVSX. In mid-March 2026, a major wave affected hundreds of repositories and dozens of extensions, prompting intervention from multiple security research groups. The attackers employ a delayed activation strategy, initially distributing clean extensions to build an install base before deploying malware through updates. Socket researchers identified three delivery methods: loading a second VSIX package from GitHub via CLI commands, deploying platform-specific compiled modules like .node files containing core malicious logic, and using heavily obfuscated JavaScript that decodes at runtime to download and install malicious payloads.

The threat extends beyond OpenVSX. On April 22, the npm registry briefly hosted a malicious version of Bitwarden’s CLI under the official package name for 93 minutes. The compromised package stole GitHub tokens, npm tokens, SSH keys, AWS and Azure credentials, and GitHub Actions secrets. Bitwarden, which serves over 10 million users across more than 50,000 businesses, confirmed the connection to a broader campaign tracked by Checkmarx researchers. Supply chain attacks exploit the time lag between package publication and content verification; Sonatype reported approximately 454,600 malicious packages infesting registries in 2025.

Socket recommends developers who installed any of the 73 flagged OpenVSX extensions rotate all secrets and clean their development environments. Security observers are monitoring whether the remaining 67 dormant extensions activate in coming days and whether OpenVSX implements stricter review controls for extension updates.

免責聲明:本頁面資訊可能來自第三方,不代表 Gate 的觀點或意見。頁面顯示的內容僅供參考,不構成任何財務、投資或法律建議。Gate 對資訊的準確性、完整性不作保證,對因使用本資訊而產生的任何損失不承擔責任。虛擬資產投資屬高風險行為,價格波動劇烈,您可能損失全部投資本金。請充分了解相關風險,並根據自身財務狀況和風險承受能力謹慎決策。具體內容詳見聲明

相關文章

北韓恐攻判決持有人升級爭奪 7,100 萬美元 Aave 凍結資產:援引反恐保險法

北韓恐攻案升溫,7,100萬美金Aave凍結資產進入第三回合。原告改以TRIA法主張ETH屬北韓國家財產,強調詐欺而非竊盗以突破小偷不擁有贓物抗辯,同時挑戰Aave的standing與治理地位。DeFi United募資逾3.28億美元,基金充足以補償受影響用戶。案件或成DeFi法理與DAO治理的關鍵判例。

鏈新聞abmedia1小時前

加密巨鯨起訴 Coinbase,指控凍結被盜 DAI 後拒絕歸還

據 The Block 於 5 月 6 日報道,一名以化名「DB」起訴的匿名加密貨幣巨鯨週一對 Coinbase 及被指控的竊賊「John Doe」提起訴訟,指控 Coinbase 在其提供宣誓書證明自己為合法所有人後,仍拒絕歸還與 2024 年加密貨幣盜竊案相關的凍結 DAI 資金。

Market Whisper2小時前

北韓恐攻受害者提交動議,要求扣押來自 Aave 駭客事件的 $71M ,並將其重新定性為詐欺

三起北韓恐怖攻擊案件受害者的律師團隊於週二提交了一份 30 頁的答辯,將 4 月 18 日的 Aave 駭入事件重新定性為詐欺而非竊盜。此一差異具有法律上的重要性:將該事件描述為詐欺,可能使攻擊者取得其所借出資產的法定所有權。

GateNews3小時前

Kelp DAO 在 2.92 億美元橋樑攻擊後捨棄 LayerZero 轉向 Chainlink CCIP

根據 The Block,Kelp DAO 在上個月發生 2.92 億美元的跨鏈橋攻擊後,放棄了 LayerZero,轉而採用 Chainlink 的跨鏈互通協議(CCIP)。一位 Chainlink 代表確認,Kelp DAO 是自該次攻擊以來,第一個完成從 LayerZero 遷移的大型協議。On

GateNews3小時前

LayerZero 聯合創辦人駁斥 KelpDAO 指控,並指出 2024 年 4 月 1 日進行了手動設定變更

根據 Bryan Pellegrino(LayerZero Labs 的共同創辦人兼執行長)的說法,針對 KelpDAO 的多數指控都沒有根據。5 月 6 日,Pellegrino 表示,Kelp 最初使用預設的 MultiDVN 或 DeadDVN 設定,但依據鏈上資料,該公司在 2024 年 4 月 1 日手動將其更改為 1/1 的設定

GateNews3小時前
留言
0/400
暫無留言