Cyber Threat Brief — April 26 2026

⚠️ This report is AI-generated. Always validate findings.

1. GlassWorm Phase 4 — 73 Open VSX Sleeper Extensions Activate

TL;DR: Socket identified 73 new GlassWorm-linked impersonation extensions on Open VSX, 6 already activated with malware using Zig-compiled native binaries that enumerate and infect every IDE on the host. This is a significant escalation from Phase 3 (March 2026, 72 extensions).

What’s New:

  • 73 sleeper extensions published by single-purpose GitHub accounts (one empty repo with 8-char random name) clone popular extensions (e.g., Turkish Language Pack, WakaTime)
  • 6 extensions activated — deliver malware via Zig-compiled .node native addons (win.node/mac.node) that bypass JavaScript sandbox with full OS access
  • Dropper enumerates all VS Code-compatible IDEs (VS Code, Cursor, Windsurf, VSCodium, Positron) and force-installs malicious .vsix from GitHub Releases
  • Solana blockchain dead-drop C2 resolver persists; Chrome extension keylogger RAT as final payload
  • Geofences Russian systems (skips execution); ~/init.json persistence mechanism carried over from Phase 3

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
specstudio.code-wakatime-activity-trackerMalicious Open VSX extensionT1195.002IDE extension auditRemove, treat host as compromised
floktokbok.autoimportMalicious secondary extensionT1195.002IDE extension auditRemove if present in any IDE
win.node / mac.node (Zig binaries in extension dir)Native dropperT1059EDR (file create, process exec)Hunt in VS Code/Cursor/Windsurf extension dirs
~/init.jsonPersistence configT1547EDR (file create)Hunt across developer workstations
GitHub accounts with 1 empty 8-char repoStaging infrastructureT1583.001GitHub audit logCorrelate with extension installs
.vsix downloads from GitHub Releases by IDE CLIPayload deliveryT1105Proxy/EDR (network + CLI args)Alert on --install-extension with GitHub Release URLs
Solana RPC calls from non-crypto processesC2 dead-dropT1102.001Proxy/DNSAlert on Solana API calls from dev tools

Detection

SourceRuleGap
Splunk ESCUNoneNo coverage for malicious IDE extension installs or .node native addon execution
ElasticNoneNo coverage for Zig binary execution from extension directories
Sigmaproc_creation_win_vscode_extension_sideload.yml (partial)Covers --install-extension CLI but not native .node addon loading or cross-IDE enumeration

Sources: Socket Research · CybersecurityNews · THN — Zig Dropper


Status Updates

  • Bitwarden/TeamPCP Supply Chain (April 25): No new artifacts. @bitwarden/[email protected] deprecated, Shai-Hulud worm IOCs unchanged. Original brief.
  • CVE-2024-7399 (Samsung MagicINFO 9): Active Mirai tuxnokill exploitation continues. Federal deadline May 15. Patch 21.1050.0 still incomplete — keep internet-facing instances offline. Original brief.
  • CVE-2024-57726/57728 (SimpleHelp RMM): DragonForce ransomware precursor chain active. Federal deadline May 15. Upgrade to ≥5.5.8. Original brief.
  • RedSun/UnDefend (Windows Defender): Still unpatched. BlueHammer (CVE-2026-33825) patched April 14 + CISA KEV April 22. Monitor TieringEngineService.exe hash changes and MsMpEng.exe writing PE/DLL under System32. Original brief.
  • CVE-2026-33626 (LMDeploy SSRF): Exploitation ongoing from 103.116.72[.]119. Fixed in 0.12.3. Hunt for IMDS/internal service access from VLM endpoints. Original brief.
  • CVE-2026-35616 (FortiClient EMS): Full fix 7.4.7 still pending; hotfix only. No Fortinet IOCs published. Hunt for EMS process spawning cmd/PowerShell. Original brief.