The Glassworm malware has resurfaced, targeting Visual Studio Code extensions to infiltrate developer environments. This sophisticated attack vector exploits the trust developers place in VS Code extensions, allowing Glassworm to execute malicious code and potentially compromise sensitive development projects. The resurgence of Glassworm highlights the evolving tactics of cybercriminals who are increasingly focusing on supply chain attacks within software development tools. Organizations and developers must remain vigilant by scrutinizing extension sources, applying strict security policies, and employing advanced threat detection mechanisms. This article delves into the technical details of the Glassworm campaign, its impact on the cybersecurity landscape, and best practices for mitigating risks associated with compromised development environments. The return of Glassworm serves as a critical reminder of the need for continuous monitoring and proactive defense strategies in the software supply chain ecosystem.
This Cyber News was published on www.darkreading.com. Publication date: Mon, 10 Nov 2025 22:15:05 +0000