{"id":45315,"date":"2026-04-10T22:22:49","date_gmt":"2026-04-10T14:22:49","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides\/"},"modified":"2026-04-10T22:22:49","modified_gmt":"2026-04-10T14:22:49","slug":"glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides\/","title":{"rendered":"GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEioOU2XpKmyRPz5kTr4GhD1YLJ2t7F6yv7bQD1upkiwmGwmzirnDAz92GvtjckyoBhBjaRqeR9XPm6e0yHdKLowfDDgZNkRlCvCneJEncgiviFu7PgD4wQg3Bo5JDhgg6JTytg_fY2M-iKeykCLebOdStW4A76JKnPbEQazihNOhKOdM9Ou8keMBh4IY4jo\/s1600\/software.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEioOU2XpKmyRPz5kTr4GhD1YLJ2t7F6yv7bQD1upkiwmGwmzirnDAz92GvtjckyoBhBjaRqeR9XPm6e0yHdKLowfDDgZNkRlCvCneJEncgiviFu7PgD4wQg3Bo5JDhgg6JTytg_fY2M-iKeykCLebOdStW4A76JKnPbEQazihNOhKOdM9Ou8keMBh4IY4jo\/s1600\/software.jpg\" alt=\"GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs\"\/><\/a><\/div>\n<p>Cybersecurity researchers have flagged yet another evolution of the&nbsp;ongoing <strong><a href=\"https:\/\/thehackernews.com\/2026\/03\/glassworm-malware-uses-solana-dead.html\">GlassWorm<\/a><\/strong> campaign, which employs a new Zig dropper that&#8217;s designed to stealthily infect all integrated development environments (IDEs) on a developer&#8217;s&nbsp;machine.<\/p>\n<p>The technique has been discovered in an Open VSX extension named&nbsp;&#8220;<a href=\"https:\/\/open-vsx.org\/extension\/specstudio\/code-wakatime-activity-tracker\">specstudio.code-wakatime-activity-tracker<\/a>,&#8221; which masquerades as WakaTime, a popular tool that measures the time programmers spend inside their IDE. The&nbsp;extension is no longer available for&nbsp;download.<\/p>\n<p>&#8220;The extension [&#8230;] ships a Zig-compiled native binary alongside its JavaScript code,&#8221; Aikido Security researcher Ilyas&nbsp;Makari <a href=\"https:\/\/www.aikido.dev\/blog\/glassworm-zig-dropper-infects-every-ide-on-your-machine\">said<\/a> in an analysis published this&nbsp;week.<\/p>\n<p>&#8220;This is not the first&nbsp;time <a href=\"https:\/\/thehackernews.com\/2025\/12\/glassworm-returns-with-24-malicious.html\">GlassWorm<\/a> has resorted to&nbsp;using <a href=\"https:\/\/www.koi.ai\/blog\/glassworm-goes-native-same-infrastructure-hardened-delivery\">native compiled&nbsp;code<\/a> in extensions. However, rather than using the binary as the payload directly, it is used as a stealthy indirection for the known GlassWorm dropper, which now secretly infects all other IDEs it can find on your&nbsp;system.&#8221;<\/p>\n<p>The newly identified Microsoft Visual Studio Code (VS Code) extension is a near replica of WakaTime, save for a change introduced in a function named &#8220;activate().&#8221; The extension installs a binary named &#8220;win.node&#8221; on Windows systems and &#8220;mac.node,&#8221; a universal Mach-O binary if the system is running Apple&nbsp;macOS.<\/p>\n<p>These Node.js&nbsp;native addons are compiled shared libraries that are written in Zig and load directly into Node&#8217;s runtime and execute outside the JavaScript sandbox with full operating system-level&nbsp;access.<\/p>\n<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjFb_56sYOjx6ioCMNc4210rtcw2VFRZdOk6P356I7RATYkrbermGGWugCPYJZw-7FlvQXeqvQHhTEaaVHYl4o-AEW0ib-KuZ2IK5cYJDMqF4XQPlfFndWcFzxgk_P2sJe6CC5bIy4c9wc7YxbjrtMAEybNF7Gvj6Tydej5VQ_3kuzyKQGXBQciCJIjy3-Z\/s1600\/chain.png\" style=\"clear: left; display: block; float: left; padding: 1em 0px; text-align: center;\"><img decoding=\"async\" border=\"0\" data-original-height=\"1678\" data-original-width=\"2984\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjFb_56sYOjx6ioCMNc4210rtcw2VFRZdOk6P356I7RATYkrbermGGWugCPYJZw-7FlvQXeqvQHhTEaaVHYl4o-AEW0ib-KuZ2IK5cYJDMqF4XQPlfFndWcFzxgk_P2sJe6CC5bIy4c9wc7YxbjrtMAEybNF7Gvj6Tydej5VQ_3kuzyKQGXBQciCJIjy3-Z\/s1600\/chain.png\" alt=\"GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs\" \/><\/a><\/div>\n<p>Once loaded, the primary goal of the binary is to find every IDE on the system that supports VS Code extensions. This&nbsp;includes Microsoft VS Code and VS Code Insiders, as well as forks like VSCodium, Positron,&nbsp;and a number&nbsp;of artificial intelligence (AI)-powered coding tools like Cursor and&nbsp;Windsurf.<\/p>\n<p>The binary then downloads a malicious VS Code extension (.VSIX) from an attacker-controlled <a href=\"https:\/\/github.com\/ColossusQuailPray\">GitHub&nbsp;account<\/a>. The&nbsp;extension &#8211; called &#8220;floktokbok.autoimport&#8221; &#8211; impersonates&nbsp;&#8220;<a href=\"https:\/\/marketplace.visualstudio.com\/items?itemName=steoates.autoimport\">steoates.autoimport<\/a>,&#8221; a legitimate extension with more than 5 million installs on the official Visual Studio Marketplace.<\/p>\n<p>In the final step,&nbsp;the downloaded&nbsp;.VSIX file is written to a temporary path and silently installed into every IDE using each editor&#8217;s CLI installer. The&nbsp;second-stage VS Code&nbsp;extension <a href=\"https:\/\/thehackernews.com\/2026\/03\/glassworm-malware-uses-solana-dead.html\">acts as a&nbsp;dropper<\/a> that avoids execution on Russian systems, talks to the Solana blockchain to fetch the command-and-control (C2) server, exfiltrates sensitive data, and installs a remote access trojan (RAT), which ultimately deploys an information-stealing Google Chrome extension.<\/p>\n<p>Users who have installed &#8220;specstudio.code-wakatime-activity-tracker&#8221; or &#8220;floktokbok.autoimport&#8221; are advised to assume compromise and rotate all&nbsp;secrets.<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers have flagged yet another evolution of the&nbsp;ongoing GlassWorm campaign, which employs a new Zig dropper that&#8217;s designed to stealthily infect all integrated development environments (IDEs) on a developer&#8217;s&nbsp;machine.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45315","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45315"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45315\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}