🎯 Threat Intelligence

GlassWorm's Stealthy Crawl: Fake Extensions and Blockchain C2 Turn Dev Tools into Spyware Nightmares

Developers grabbed what looked like a routine npm update. Hours later, GlassWorm had turned their machines into crypto-stealing spies, complete with fake browser extensions watching every tab.

Infographic showing GlassWorm infection chain from npm package to fake Chrome extension surveillance

⚡ Key Takeaways

  • GlassWorm uses Solana blockchain memos for dynamic, resilient C2— a new evasion standard. 𝕏
  • Fake 'Google Docs Offline' Chrome extension enables total browser surveillance, from DOM snapshots to keylogs. 𝕏
  • Targets developers for supply chain use; stolen tokens could cascade to enterprise-wide breaches. 𝕏
Published by

Threat Digest

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Malwarebytes Labs

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.