
New GlassWorm Malware Targets Macs: Trojanized Crypto Wallets Wave
Episode · 0 Play
Episode · 12:11 · Jan 2, 2026
About
Key Takeaways New GlassWorm Malware Targets Macs: Trojanized Crypto Wallets Wavehttps://pressreleasecloud.io/new-glassworm-malware-targets-macs-trojanized-crypto-wallets-wave/GlassWorm malware has evolved with a fourth wave now specifically targeting Mac users with trojanized cryptocurrency walletsThe attack vector uses malicious VS Code extensions on the OpenVSX marketplace, which have accumulated over 50,000 downloadsDevelopers in crypto, web3, and startup environments are the primary targets as they frequently use Mac systemsThe malware employs sophisticated AES-256-CBC encryption techniques rather than the invisible Unicode or Rust binaries seen in previous wavesOnce infected, your cryptocurrency holdings could be at significant risk of theft through compromised wallet applicationsMac users beware: your cryptocurrency is now at risk from a sophisticated new threat. Cybersecurity researchers have identified a fourth wave of the dangerous GlassWorm malware campaign, and this time it's exclusively targeting macOS systems with trojanized versions of popular cryptocurrency wallet applications.This marks a significant shift from previous GlassWorm campaigns which focused primarily on Windows systems. The threat actors have adapted their tactics, techniques, and procedures to specifically compromise Mac users in the cryptocurrency space, demonstrating an alarming evolution in their capabilities and targeting strategy.GlassWorm's Dangerous Evolution: Now Targeting Mac UsersThe GlassWorm malware first appeared in October, hidden inside malicious extensions using "invisible" Unicode characters to evade detection. What makes this fourth wave particularly concerning is the complete pivot to targeting Mac systems, suggesting a strategic decision by the threat actors to focus on a different user base rich with cryptocurrency assets."The GlassWorm actor isn't just persistent – they're evolving. And now they're coming for your Mac," security researchers at Koi Security noted in their comprehensive analysis. This evolution demonstrates the adaptability of modern threat actors and their willingness to retool their malware for different operating systems when profitable targets are identified.The fourth wave represents a sophisticated leap in technical implementation. Instead of using invisible Unicode characters (first and second waves) or compiled Rust binaries (third wave), the attackers have now implemented AES-256-CBC–encrypted payloads embedded in compiled JavaScript within the OpenVSX extensions. This encryption approach makes detection significantly more challenging for standard security tools.
12m 11s · Jan 2, 2026
© 2026 Blubrry (OG)