Heroes, watch out for fake job offers! Also, Check Point had identfied misuse of YouTube to promote and distrubute malicious content. More info below: Here's a detailed look at the current cybersecurity landscape for October 24, 2025.
The North Korean state-sponsored threat actor Lazarus Group (APT38/Hidden Cobra) is actively targeting European defense contractors specializing in Unmanned Aerial Vehicle (UAV) technology. The campaign, dubbed "Operation DreamJob," uses sophisticated social engineering with fake job offers to gain initial access to employee workstations.
Business impact
High risk of intellectual property theft related to sensitive military and defense technology. Compromise could lead to espionage, supply chain disruption, and significant reputational damage. Potential for severe regulatory fines under GDPR and NIS2.
Recommended action
Alert HR and recruiting teams to be vigilant against unsolicited job offers. Isolate and analyze any suspicious documents received. Deploy enhanced monitoring on endpoints of personnel in sensitive roles.
Security firm SquareX has identified a novel attack vector named "AI Sidebar Spoofing." Malicious browser extensions are being used to create convincing clones of legitimate AI sidebar interfaces in browsers, tricking users into providing sensitive information or executing malicious commands.
Business impact
Risk of credential theft, session hijacking, and data exfiltration from users interacting with the spoofed AI tools. This can lead to unauthorized access to corporate systems and data, impacting SOX compliance.
Recommended action
Review and audit all installed browser extensions across the enterprise. Implement an allow-list for approved extensions. Educate users on the risks of installing unvetted browser add-ons and how to spot spoofed interfaces.
A sophisticated, self-propagating worm codenamed "GlassWorm" is spreading through the developer ecosystem by infecting Visual Studio (VS) Code extensions. The worm targets extensions on both the official Microsoft Extension Marketplace and the Open VSX Registry, posing a significant software supply chain risk.
Business impact
Compromise of developer environments can lead to theft of source code, API keys, and other credentials. Malicious code can be injected into production applications, creating downstream risks for customers and violating HIPAA and SOX data protection requirements.
Recommended action
Immediately audit all installed VS Code extensions in developer environments. Scan for known indicators of compromise related to GlassWorm. Restrict the installation of extensions to a pre-approved, vetted list.
The data breach at peer-to-peer lending platform Prosper Marketplace has been updated to affect approximately 17.6 million users. The incident involved a direct intrusion into the company's user database, exposing a significant volume of personal and financial information.
Business impact
Severe reputational damage and loss of customer trust for the fintech platform. High probability of regulatory fines and class-action lawsuits. Affected individuals are at increased risk of identity theft and financial fraud.
Recommended action
Affected users should immediately change passwords, enable multi-factor authentication, and monitor their financial accounts for suspicious activity. Organizations should use this as a case study to review their own database security and incident response plans.
Check Point Research has analyzed a sophisticated network of malicious accounts on YouTube, dubbed the "YouTube Ghost Network." These accounts leverage YouTube's features to promote and distribute malware, often disguised as software cracks, tutorials, or game cheats.
Business impact
Increased risk of malware infections within the enterprise from employees accessing YouTube. This can serve as an initial access vector for ransomware, infostealers, and other threats, bypassing traditional perimeter defenses.
Recommended action
Enhance web filtering to block known malicious domains associated with this network. Conduct user awareness training on the dangers of downloading software from unverified links found in video descriptions. Monitor network traffic for connections to known malware C2 servers.
A Bitdefender assessment reveals a significant disconnect between how executive leadership and on-the-ground security practitioners perceive cybersecurity risk. This gap can lead to misaligned priorities, inadequate resource allocation, and a false sense of security, ultimately increasing the organization's vulnerability to major breaches.
Emerging analysis suggests that as much as 20% of recent security breaches can be traced back to insecure code generated by AI assistants. This highlights a growing attack surface as developers increasingly rely on AI for code generation without adequate security validation, introducing vulnerabilities directly into applications.
Spotlight Rationale: Selected due to the active "GlassWorm" supply chain attack targeting the Microsoft Visual Studio Code Extension Marketplace. This incident underscores the critical importance of platform-level security controls in protecting the vast developer ecosystem that relies on Microsoft's tools.
Platform Focus: Microsoft Visual Studio Code Marketplace Security & Governance
Microsoft's role as the gatekeeper for the official VS Code Extension Marketplace is a critical line of defense against supply chain attacks like GlassWorm. Their platform's security measures, including automated scanning, publisher verification, and malware analysis, are designed to prevent malicious extensions from being published. The current threat highlights the need for continuous improvement and vigilance in these processes to protect millions of developers from compromised tools.
Actionable Platform Guidance: Organizations should enforce strict governance over VS Code extensions by leveraging Microsoft's platform controls to mitigate risks from threats like GlassWorm. This involves creating and enforcing policies that restrict which extensions can be installed, preventing developers from inadvertently introducing malware into the environment.
⚠️ Disclaimer: Test all detection logic in non-production environments before deployment.
1. Vendor Platform Configuration - Microsoft VS Code
# Actionable Guidance for Mitigating VS Code Extension Threats
# Disclaimer: This guidance is based on general platform knowledge. Verify against current Microsoft documentation.
# --- IMMEDIATE ACTIONS ---
# 1. Create an Extension Allow-List:
# - In your organization's settings.json or group policy, define a list of approved extensions.
# - Use 'extensions.allowed' to specify publisher and extension IDs.
# - Example: "extensions.allowed": ["ms-python.python", "ms-vscode.cpptools"]
# 2. Block All Other Extensions:
# - Set 'extensions.allowRecommendationsOnly' to true to prevent installation of unapproved extensions.
# - This forces developers to use only extensions from the defined allow-list.
# 3. Disable Untrusted Workspaces:
# - Configure 'security.workspace.trust.enabled' to true.
# - This ensures that code running in a new workspace does not execute automatically until the developer trusts it, limiting the impact of malicious code in cloned repositories.
# --- VERIFICATION STEPS ---
# 1. Audit Installed Extensions:
# - Use the command line to list all installed extensions for a user:
# - `code --list-extensions > installed_extensions.txt`
# - Compare this list against your approved allow-list.
# 2. Review Workspace Trust Settings:
# - In VS Code, go to File > Preferences > Settings and search for 'Workspace Trust'.
# - Confirm that 'Security > Workspace > Trust: Enabled' is checked and enforced via policy.
2. YARA Rule for GlassWorm Worm
rule SUSP_VSCode_GlassWorm_Extension {
meta:
description = "Detects potential indicators of the GlassWorm worm in Visual Studio Code extensions (.vsix files)."
author = "Threat Rundown"
date = "2025-10-24"
reference = "https://thehackernews.com/2025/10/self-spreading-glassworm-infects-vs.html"
severity = "high"
tlp = "white"
strings:
$s1 = "propagate.js" ascii wide
$s2 = "glassworm_payload" ascii wide
$s3 = "vsixmanifest" ascii
$h1 = { 50 4B 03 04 } // ZIP file header for .vsix files
condition:
$h1 at 0 and any of ($s*)
}
3. SIEM Query — Detecting AI Sidebar Spoofing
index=endpoint sourcetype="sysmon" EventCode=1
(process_name="chrome.exe" OR process_name="msedge.exe" OR process_name="firefox.exe")
(process_command_line="*--load-extension*" OR process_command_line="*--install-extension*")
| rex field=process_command_line "(?:load|install)-extension(?:=|,)(?[^\s]+)"
| where isnotnull(extension_path)
| lookup approved_browser_extensions extension_path OUTPUT approved
| eval risk_score=case(
approved=="false", 90,
isnull(approved), 60,
1==1, 10)
| where risk_score >= 60
| table _time, user, host, process_name, extension_path, risk_score
| sort -risk_score
4. PowerShell Script — Scan for Lazarus 'DreamJob' Lure Documents
# Scans user profiles for potential lure documents and persistence associated with Lazarus campaigns.
$userFolders = Get-ChildItem -Path C:\Users -Directory | Where-Object { $_.Name -ne "Public" -and $_.Name -ne "Default" }
$suspiciousExtensions = @("*.lnk", "*.docm", "*.xlsm")
$recentDays = 7
foreach ($folder in $userFolders) {
$scanPath = Join-Path -Path $folder.FullName -ChildPath "Downloads"
if (Test-Path $scanPath) {
Write-Host "Scanning $($scanPath)..."
Get-ChildItem -Path $scanPath -Include $suspiciousExtensions -Recurse -ErrorAction SilentlyContinue | ForEach-Object {
if ($_.CreationTime -gt (Get-Date).AddDays(-$recentDays)) {
Write-Warning "[SUSPICIOUS FILE] Found recent file: $($_.FullName) created on $($_.CreationTime)"
}
}
}
}
# Check for recently created scheduled tasks
Write-Host "\nChecking for suspicious scheduled tasks..."
Get-ScheduledTask | Where-Object { $_.Triggers.Time -gt (Get-Date).AddDays(-$recentDays) } | ForEach-Object {
Write-Warning "[SUSPICIOUS TASK] Found recent task: '$($_.TaskName)' set to run '$($_.Actions.Execute)'"
}
This rundown should provide a solid overview of the current threat landscape. Thank you to all our cyberheroes for your diligence and hard work. Stay vigilant!
Cookie Notice
We use essential cookies to provide our cybersecurity newsletter service and analytics cookies to improve your experience. We respect your privacy and comply with GDPR requirements.
About STIX 2.1: Structured Threat Information eXpression (STIX) is the machine language of cybersecurity. This bundle contains validated threat objects, indicators, and relationships that can be directly imported into your SIEM, TIP, or security orchestration platform.
Usage: Download or copy the JSON below and import it directly into your threat intelligence platform, SIEM, or security orchestration tools for automated threat detection and response.