LIVE NEWS
  • Stayed in Balcony Cabin on Norwegian Cruise Line Luna Ship: Review
  • ‘Everyone wants a spaceplane’: More countries eye on-orbit protection for satellites
  • Stocks See Support as Inflation Concerns Ease
  • That time the Air Force proposed making a ‘gay bomb’
  • Scientists say we’ve been treating Alzheimer’s all wrong
  • Orbán faces strongest challenge in years : NPR
  • Worldcoin eases off the gas as WLD unlock rate drops 43%
  • GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
Cybersecurity

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

primereportsBy primereportsApril 10, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
Share
Facebook Twitter LinkedIn Pinterest Email


Ravie LakshmananApr 10, 2026Malware / Blockchain

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that’s designed to stealthily infect all integrated development environments (IDEs) on a developer’s machine.

The technique has been discovered in an Open VSX extension named “specstudio.code-wakatime-activity-tracker,” which masquerades as WakaTime, a popular tool that measures the time programmers spend inside their IDE. The extension is no longer available for download.

“The extension […] ships a Zig-compiled native binary alongside its JavaScript code,” Aikido Security researcher Ilyas Makari said in an analysis published this week.

Cybersecurity

“This is not the first time GlassWorm has resorted to using native compiled code in extensions. However, rather than using the binary as the payload directly, it is used as a stealthy indirection for the known GlassWorm dropper, which now secretly infects all other IDEs it can find on your system.”

The newly identified Microsoft Visual Studio Code (VS Code) extension is a near replica of WakaTime, save for a change introduced in a function named “activate().” The extension installs a binary named “win.node” on Windows systems and “mac.node,” a universal Mach-O binary if the system is running Apple macOS.

These Node.js native addons are compiled shared libraries that are written in Zig and load directly into Node’s runtime and execute outside the JavaScript sandbox with full operating system-level access.

Once loaded, the primary goal of the binary is to find every IDE on the system that supports VS Code extensions. This includes Microsoft VS Code and VS Code Insiders, as well as forks like VSCodium, Positron, and a number of artificial intelligence (AI)-powered coding tools like Cursor and Windsurf.

The binary then downloads a malicious VS Code extension (.VSIX) from an attacker-controlled GitHub account. The extension – called “floktokbok.autoimport” – impersonates “steoates.autoimport,” a legitimate extension with more than 5 million installs on the official Visual Studio Marketplace.

Cybersecurity

In the final step, the downloaded .VSIX file is written to a temporary path and silently installed into every IDE using each editor’s CLI installer. The second-stage VS Code extension acts as a dropper that avoids execution on Russian systems, talks to the Solana blockchain to fetch the command-and-control (C2) server, exfiltrates sensitive data, and installs a remote access trojan (RAT), which ultimately deploys an information-stealing Google Chrome extension.

Users who have installed “specstudio.code-wakatime-activity-tracker” or “floktokbok.autoimport” are advised to assume compromise and rotate all secrets.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCan the secondary market allay private-credit fears?
Next Article Worldcoin eases off the gas as WLD unlock rate drops 43%
primereports
  • Website

Related Posts

Cybersecurity

Russia Hacked Routers to Steal Microsoft Office Tokens – Krebs on Security

April 10, 2026
Cybersecurity

Apple Intelligence AI Guardrails Bypassed in New Attack

April 9, 2026
Cybersecurity

Claude Managed Agents bring execution and control to AI agent workflows

April 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Stayed in Balcony Cabin on Norwegian Cruise Line Luna Ship: Review
  • ‘Everyone wants a spaceplane’: More countries eye on-orbit protection for satellites
  • Stocks See Support as Inflation Concerns Ease
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.