Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A Supply Chain Attack Targets Open VSX: A Threat to DevOps and Developer Security


A recent supply chain attack on the Open VSX Registry has exposed vulnerabilities in developer tools and extensions, highlighting the need for increased security awareness and vigilance among developers and organizations.

  • Malicious updates compromised legitimate developer resources.
  • A known campaign called GlassWorm was linked to the attack.
  • The malware stole Apple macOS credentials and cryptocurrency wallet data.
  • The attack exposed private repositories, CI secrets, and release automation to potential cloud account compromise.
  • Behavioral detection and rapid response are crucial in defending against such threats.



  • A recent supply chain attack on the Open VSX Registry has highlighted the vulnerability of developer tools and extensions to malicious activity. The incident, disclosed by cybersecurity researchers, involves the compromise of a legitimate developer's resources to push malicious updates to downstream users.

    The attack, attributed to unidentified threat actors, targeted four established Open VSX extensions: FTP/SFTP/SSH Sync Tool, I18n Tools, vscode mindmap, and scss to css. The malicious versions of these extensions were designed to deliver a loader malware associated with a known campaign called GlassWorm. This malware is equipped with various weaponized techniques, including EtherHiding, which fetches command-and-control (C2) endpoints, and ultimately runs code designed to steal Apple macOS credentials and cryptocurrency wallet data.

    The payload of the malware includes routines to locate and extract authentication material used in common workflows, such as inspecting npm configuration for _authToken and referencing GitHub authentication artifacts. These can provide access to private repositories, CI secrets, and release automation. The attack also utilizes Solana memos as a dynamic dead drop to rotate staging infrastructure without republishing extensions.

    The targeting of developer information poses severe risks to enterprise environments, exposing them to potential cloud account compromise and lateral movement attacks. As a result, cybersecurity experts emphasize the importance of behavioral detection and rapid response in defending against such threats.

    The attack on Open VSX has also shed light on the use of compromised accounts by threat actors to distribute malware. This divergence from previously observed GlassWorm indicators highlights the evolving nature of cyber threats and the need for defenders to stay vigilant.

    In conclusion, the supply chain attack on Open VSX serves as a wake-up call for developers and organizations to prioritize security and vigilance in their development workflows. The incident underscores the importance of maintaining robust security controls, monitoring developer activity closely, and staying informed about emerging threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/A-Supply-Chain-Attack-Targets-Open-VSX-A-Threat-to-DevOps-and-Developer-Security-ehn.shtml

  • https://thehackernews.com/2026/02/open-vsx-supply-chain-attack-used.html

  • https://socket.dev/blog/glassworm-loader-hits-open-vsx-via-suspected-developer-account-compromise


  • Published: Sun Feb 1 23:15:35 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us