Back to News
Cybersecurity

GlassWorm Campaign Advances with Zig Dropper Targeting Developer IDEs

The latest iteration of the GlassWorm campaign uses a Zig dropper to stealthily compromise multiple developer IDEs through malicious extensions.

Cybersecurity researchers have identified a new phase in the GlassWorm campaign, utilizing a Zig dropper to infect various integrated development environments (IDEs) on developers' machines. This tactic was discovered in a malicious Open VSX extension named "specstudio.code-wakatime-activity-tracker," which disguises itself as a legitimate WakaTime tool. The stealthy nature of this dropper poses a significant threat, as it can infiltrate multiple IDEs, potentially affecting a wide array of coding environments and developer workflows.

For businesses, the implications are profound, especially for those relying on IDEs for software development. This campaign highlights the necessity of rigorous security protocols and vigilant monitoring of third-party extensions and plugins. Companies must prioritize employee training on identifying suspicious tools and establishing comprehensive cybersecurity measures to protect their development environments. As threats like the GlassWorm campaign evolve, staying ahead of such attacks is critical for safeguarding intellectual property and maintaining operational integrity, making this a pivotal issue in the realms of both cybersecurity and artificial intelligence.

---

*Originally reported by [The Hacker News](https://thehackernews.com/2026/04/glassworm-campaign-uses-zig-dropper-to.html)*