Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Palo Alto PAN-OS 0-Day Exploited to Execute Arbitrary Code With
May 14, 2026
OpenAI Sued for Sharing ChatGPT Data with Google, Class-Action Privacy
May 14, 2026
Langflow CVE-2026-33017 Exploited to Steal AWS Keys and Deploy
May 14, 2026
Home/Threats/GlassWorm Attacks Developers via 22K+ Infiltrated Extensions
Threats

GlassWorm Attacks Developers via 22K+ Infiltrated Extensions

Developers relying on the Open VSX Registry now face a serious new threat: GlassWorm. This campaign silently weaponizes popular VSX extensions, transforming them into delivery vehicles for malware....

Emy Elsamnoudy
Emy Elsamnoudy
February 3, 2026 3 Min Read
5 0

Developers relying on the Open VSX Registry now face a serious new threat: GlassWorm. This campaign silently weaponizes popular VSX extensions, transforming them into delivery vehicles for malware.

Threat actors compromised a trusted publisher account and pushed poisoned updates that looked like routine releases but actually carried a staged loader.

These extensions, which had more than 22,000 downloads, were widely adopted tools used for file sync, internationalization, mind mapping, and CSS workflows, turning everyday development tasks into potential entry points for attackers.

Socket.dev analysts identified this campaign as a developer-compromise supply chain attack, likely triggered by leaked publishing tokens or other unauthorized access to the oorzc publisher account.

Once the malicious versions were live, any developer who installed or updated the affected extensions risked pulling down the GlassWorm loader without any obvious warning.

The Open VSX security team later confirmed the compromise, removed the malicious releases, and revoked the publisher’s tokens, but the exposure window was long enough to raise serious concerns about stolen credentials and downstream abuse.

GlassWorm is not a new name in the ecosystem, but this wave marks a clear escalation in tradecraft.

Instead of relying on fake or cloned projects, the attackers hid inside real, long-standing extensions with a history of legitimate use.

The malware focuses heavily on macOS systems, where it steals browser data, cryptocurrency wallets, and sensitive files, while also going after developer material such as SSH keys, AWS credentials, and GitHub or npm tokens.

Simple theft to deep supply chain access

This shift from simple theft to deep supply chain access means one compromised laptop can quickly become a stepping stone into cloud environments and CI pipelines.

Open VSX Registry showing the oorzc namespace with four published extensions (Source - Socket.dev)
Open VSX Registry showing the oorzc namespace with four published extensions (Source – Socket.dev)

This shows the oorzc namespace listing the four compromised extensions: FTP/SFTP/SSH Sync Tool, I18n Tools, vscode mindmap, and scss to css, all appearing completely benign to the average user.

This visual highlights how normal the extensions looked at the time of the attack, reinforcing how hard it is for developers to spot such threats by eye.

Publisher profile for oorzc on Visual Studio Marketplace listing four extensions (Source - Socket.dev)
Publisher profile for oorzc on Visual Studio Marketplace listing four extensions (Source – Socket.dev)

While this illustrates the staged execution chain that powers GlassWorm’s infection mechanism.

The first stage decrypts and runs an embedded payload, which then profiles the host, avoids Russian-locale systems, and retrieves its next command-and-control instructions from Solana transaction memos.

A final macOS-focused stage collects credentials, keychains, and documents, compresses them into an archive, and exfiltrates the data to attacker-controlled infrastructure, while a LaunchAgent entry ensures the malware survives reboots and continues to run in the background.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Fake Dropbox Phishing Attack Steals User Login Credentials

Next Post

Hackers Exploit React Server Components Vulnerability

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Windows DNS Client Flaw Allows Remote Code Execution
May 14, 2026
Critical NGINX Vulnerability Allows Remote Code Execution –
May 14, 2026
Critical MongoDB Flaw Allows Arbitrary Code Execution
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us