Cybersecurity researchers have flagged one more evolution of the ongoing GlassWorm marketing campaign, which employs a brand new Zig dropper that is designed to stealthily infect all built-in growth environments (IDEs) on a developer’s machine.
The method has been found in an Open VSX extension named “specstudio.code-wakatime-activity-tracker,” which masquerades as WakaTime, a well-liked device that measures the time programmers spend inside their IDE. The extension is not accessible for obtain.
“The extension […] ships a Zig-compiled native binary alongside its JavaScript code,” Aikido Safety researcher Ilyas Makari mentioned in an evaluation printed this week.
“This isn’t the primary time GlassWorm has resorted to utilizing native compiled code in extensions. Nonetheless, moderately than utilizing the binary because the payload immediately, it’s used as a stealthy indirection for the recognized GlassWorm dropper, which now secretly infects all different IDEs it will possibly discover in your system.”
The newly recognized Microsoft Visible Studio Code (VS Code) extension is a close to duplicate of WakaTime, save for a change launched in a operate named “activate().” The extension installs a binary named “win.node” on Home windows techniques and “mac.node,” a common Mach-O binary if the system is working Apple macOS.
These Node.js native addons are compiled shared libraries which can be written in Zig and cargo immediately into Node’s runtime and execute outdoors the JavaScript sandbox with full working system-level entry.

As soon as loaded, the first aim of the binary is to seek out each IDE on the system that helps VS Code extensions. This contains Microsoft VS Code and VS Code Insiders, in addition to forks like VSCodium, Positron, and a quantity of synthetic intelligence (AI)-powered coding instruments like Cursor and Windsurf.
The binary then downloads a malicious VS Code extension (.VSIX) from an attacker-controlled GitHub account. The extension – referred to as “floktokbok.autoimport” – impersonates “steoates.autoimport,” a reputable extension with greater than 5 million installs on the official Visible Studio Market.
Within the remaining step, the downloaded .VSIX file is written to a short lived path and silently put in into each IDE utilizing every editor’s CLI installer. The second-stage VS Code extension acts as a dropper that avoids execution on Russian techniques, talks to the Solana blockchain to fetch the command-and-control (C2) server, exfiltrates delicate information, and installs a distant entry trojan (RAT), which finally deploys an information-stealing Google Chrome extension.
Customers who’ve put in “specstudio.code-wakatime-activity-tracker” or “floktokbok.autoimport” are suggested to imagine compromise and rotate all secrets and techniques.
Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the most recent breakthroughs, get unique updates, and join with a worldwide community of future-focused thinkers.
Unlock tomorrow’s developments right now: learn extra, subscribe to our publication, and turn out to be a part of the NextTech group at NextTech-news.com

