Close Menu
geekfence.comgeekfence.com
    What's Hot

    The Devil Wears Prada 2 Streaming, VOD, DVD And Blu-ray Release Date

    April 30, 2026

    AI Code Review Only Catches Half of Your Bugs – O’Reilly

    April 30, 2026

    Belden to acquire RUCKUS Networks for $1.85bn

    April 30, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
    Cyber Security

    GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

    AdminBy AdminApril 10, 2026No Comments2 Mins Read3 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Ravie LakshmananApr 10, 2026Malware / Blockchain

    GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

    Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that’s designed to stealthily infect all integrated development environments (IDEs) on a developer’s machine.

    The technique has been discovered in an Open VSX extension named “specstudio.code-wakatime-activity-tracker,” which masquerades as WakaTime, a popular tool that measures the time programmers spend inside their IDE. The extension is no longer available for download.

    “The extension […] ships a Zig-compiled native binary alongside its JavaScript code,” Aikido Security researcher Ilyas Makari said in an analysis published this week.

    “This is not the first time GlassWorm has resorted to using native compiled code in extensions. However, rather than using the binary as the payload directly, it is used as a stealthy indirection for the known GlassWorm dropper, which now secretly infects all other IDEs it can find on your system.”

    The newly identified Microsoft Visual Studio Code (VS Code) extension is a near replica of WakaTime, save for a change introduced in a function named “activate().” The extension installs a binary named “win.node” on Windows systems and “mac.node,” a universal Mach-O binary if the system is running Apple macOS.

    These Node.js native addons are compiled shared libraries that are written in Zig and load directly into Node’s runtime and execute outside the JavaScript sandbox with full operating system-level access.

    Once loaded, the primary goal of the binary is to find every IDE on the system that supports VS Code extensions. This includes Microsoft VS Code and VS Code Insiders, as well as forks like VSCodium, Positron, and a number of artificial intelligence (AI)-powered coding tools like Cursor and Windsurf.

    The binary then downloads a malicious VS Code extension (.VSIX) from an attacker-controlled GitHub account. The extension – called “floktokbok.autoimport” – impersonates “steoates.autoimport,” a legitimate extension with more than 5 million installs on the official Visual Studio Marketplace.

    In the final step, the downloaded .VSIX file is written to a temporary path and silently installed into every IDE using each editor’s CLI installer. The second-stage VS Code extension acts as a dropper that avoids execution on Russian systems, talks to the Solana blockchain to fetch the command-and-control (C2) server, exfiltrates sensitive data, and installs a remote access trojan (RAT), which ultimately deploys an information-stealing Google Chrome extension.

    Users who have installed “specstudio.code-wakatime-activity-tracker” or “floktokbok.autoimport” are advised to assume compromise and rotate all secrets.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Iran-linked Handala hackers leak US Marines data, send chilling WhatsApp threats

    April 30, 2026

    The current state of prompt injections on the web

    April 29, 2026

    Microsoft to deprecate legacy TLS in Exchange Online starting July

    April 28, 2026

    Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren’t Ready for the Remediation Side

    April 27, 2026

    US Busts Myanmar Ring Targeting US Citizens in Financial Fraud

    April 26, 2026

    ‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty – Krebs on Security

    April 25, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202533 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202626 Views

    Redefining AI efficiency with extreme compression

    March 25, 202625 Views
    Don't Miss

    The Devil Wears Prada 2 Streaming, VOD, DVD And Blu-ray Release Date

    April 30, 2026

    Summary created by Smart Answers AIIn summary:Tech Advisor reports that The Devil Wears Prada 2…

    AI Code Review Only Catches Half of Your Bugs – O’Reilly

    April 30, 2026

    Belden to acquire RUCKUS Networks for $1.85bn

    April 30, 2026

    Is Refusing to Adopt AI Tools at Work Damaging Your Career Growth?

    April 30, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    The Devil Wears Prada 2 Streaming, VOD, DVD And Blu-ray Release Date

    April 30, 2026

    AI Code Review Only Catches Half of Your Bugs – O’Reilly

    April 30, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.