GlassWorm

MITRE
Malware Type:
Other
First seen:
Unknown
Last seen:
Unknown
Details:

[GlassWorm](https://attack.mitre.org/software/S9010) is a worm that propagated through supply chain attacks by compromising repository credentials from victim environments and having malicious payloads added to those compromised accounts for distribution to victims across the various development ecosystems.(Citation: Koi Glassworm InvisibleCode October 2025)(Citation: Aikido GlassWorm October 2025)(Citation: Socket GlassWorm January 2026) [GlassWorm](https://attack.mitre.org/software/S9010) has numerous variants, including Rust binaries, encrypted JavaScript and a variant leveraging invisible Unicode characters that made reverse engineering difficult.(Citation: Koi Glassworm New Tricks December 2025)(Citation: Koi Glassworm InvisibleCode October 2025)(Citation: Koi GlassWorm Rust December 2025) [GlassWorm](https://attack.mitre.org/software/S9010) has employed a unique command and control (C2) methodology using Solana blockchain.(Citation: Koi Glassworm Extensions November 2025)(Citation: Koi Glassworm InvisibleCode October 2025) [GlassWorm](https://attack.mitre.org/software/S9010) was first reported in October 2025.(Citation: Koi Glassworm Extensions November 2025)(Citation: Koi Glassworm InvisibleCode October 2025)(Citation: Socket GlassWorm January 2026)

Associated Techniques (36)
ID ATT&CK Tactics
T1005 Data from Local System -
T1008 Fallback Channels -
T1027.013 Encrypted/Encoded File -
T1027.018 Invisible Unicode -
T1036 Masquerading -
T1059.002 AppleScript -
T1059.007 JavaScript -
T1071.001 Web Protocols -
T1074.001 Local Data Staging -
T1082 System Information Discovery -
T1090.001 Internal Proxy -
T1102.001 Dead Drop Resolver -
T1105 Ingress Tool Transfer -
T1124 System Time Discovery -
T1140 Deobfuscate/Decode Files or Information -
Metadata
ID: 164448
Created: 28/04/2026 16:00
Updated: 10/05/2026 04:00