Description

Security researchers have identified a new wave of the GlassWorm malware actively targeting macOS systems, with a specific focus on developers and cryptocurrency users. This campaign distributes malware through trojanized crypto wallet applications and malicious Visual Studio Code (VSCode) extensions, masquerading as legitimate developer tools. Once installed, GlassWorm is capable of stealing sensitive information, including developer credentials, Keychain data, and cryptocurrency wallet details, posing a significant risk to both individual users and organizations relying on macOS-based development environments. The latest GlassWorm wave leverages a supply-chain style attack, where malicious extensions are uploaded to repositories such as OpenVSX and appear trustworthy to unsuspecting users. These extensions contain encrypted JavaScript payloads that delay execution to evade sandbox and automated analysis systems. Unlike earlier GlassWorm campaigns that primarily targeted Windows, this iteration uses macOS-specific persistence mechanisms, including AppleScript and LaunchAgents, to maintain long-term access. The malware harvests credentials from browsers, developer platforms like GitHub and npm, and attempts to interfere with popular hardware wallet software by replacing legitimate binaries with compromised versions. Command-and-control configuration is partially retrieved using blockchain-based techniques, increasing stealth and resilience. This campaign affects macOS users globally, particularly developers and individuals managing cryptocurrency assets. The potential impact includes credential theft, unauthorized access to development repositories, and financial loss through compromised wallets. To mitigate risk, users should immediately remove untrusted VSCode extensions, reset credentials associated with developer and crypto platforms, and enable multi-factor authentication wherever possible. Organizations are advised to restrict extension installation, monitor macOS persistence locations, deploy endpoint security capable of detecting script-based malware, and ensure crypto wallet software is installed only from verified, official sources.