GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
好的,我现在需要帮用户总结一篇关于网络安全的文章,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章提到GlassWorm活动的演变,使用了新的Zig加载器,专门感染开发者的IDE。攻击者伪装成WakaTime工具,通过Open VSX扩展传播。这个扩展包含Zig编译的二进制文件和JavaScript代码,能够感染多个IDE,并下载恶意扩展,最终部署远程访问木马和信息窃取工具。 接下来,我需要将这些要点浓缩成一句话。要确保涵盖攻击手段、伪装对象、影响范围以及后果。同时,语言要简洁明了,不超过100字。 可能的结构是:GlassWorm活动的新攻击方式,利用伪装的扩展感染开发者IDE,导致恶意软件安装和数据泄露。 检查一下是否所有关键点都包括进去:新Zig加载器、伪装WakaTime、感染多个IDE、下载恶意扩展、部署RAT和窃取工具。是的,这些都涵盖了。 最后,确保句子流畅自然,没有语法错误。 </think> GlassWorm网络攻击活动的新变种利用伪装成WakaTime工具的恶意扩展感染开发者环境,通过Zig编译的二进制文件秘密传播,最终部署远程访问木马和信息窃取工具,严重威胁开发者的系统安全。 2026-4-10 13:23:0 Author: thehackernews.com(查看原文) 阅读量:5 收藏

Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's designed to stealthily infect all integrated development environments (IDEs) on a developer's machine.

The technique has been discovered in an Open VSX extension named "specstudio.code-wakatime-activity-tracker," which masquerades as WakaTime, a popular tool that measures the time programmers spend inside their IDE. The extension is no longer available for download.

"The extension [...] ships a Zig-compiled native binary alongside its JavaScript code," Aikido Security researcher Ilyas Makari said in an analysis published this week.

"This is not the first time GlassWorm has resorted to using native compiled code in extensions. However, rather than using the binary as the payload directly, it is used as a stealthy indirection for the known GlassWorm dropper, which now secretly infects all other IDEs it can find on your system."

The newly identified Microsoft Visual Studio Code (VS Code) extension is a near replica of WakaTime, save for a change introduced in a function named "activate()." The extension installs a binary named "win.node" on Windows systems and "mac.node," a universal Mach-O binary if the system is running Apple macOS.

These Node.js native addons are compiled shared libraries that are written in Zig and load directly into Node's runtime and execute outside the JavaScript sandbox with full operating system-level access.

Once loaded, the primary goal of the binary is to find every IDE on the system that supports VS Code extensions. This includes Microsoft VS Code and VS Code Insiders, as well as forks like VSCodium, Positron, and a number of artificial intelligence (AI)-powered coding tools like Cursor and Windsurf.

The binary then downloads a malicious VS Code extension (.VSIX) from an attacker-controlled GitHub account. The extension – called "floktokbok.autoimport" – impersonates "steoates.autoimport," a legitimate extension with more than 5 million installs on the official Visual Studio Marketplace.

In the final step, the downloaded .VSIX file is written to a temporary path and silently installed into every IDE using each editor's CLI installer. The second-stage VS Code extension acts as a dropper that avoids execution on Russian systems, talks to the Solana blockchain to fetch the command-and-control (C2) server, exfiltrates sensitive data, and installs a remote access trojan (RAT), which ultimately deploys an information-stealing Google Chrome extension.

Users who have installed "specstudio.code-wakatime-activity-tracker" or "floktokbok.autoimport" are advised to assume compromise and rotate all secrets.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/glassworm-campaign-uses-zig-dropper-to.html
如有侵权请联系:admin#unsafe.sh