Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers



GlassWorm, a notorious malware campaign, has been linked to a recent supply-chain attack that exploits the vulnerabilities of the Open VSX registry. This new iteration represents a "significant escalation" in how it propagates through the Open VSX registry, with 72 malicious extensions being discovered. The attackers used invisible Unicode characters and Remote Dynamic Dependencies to hide their malicious code, making it challenging for researchers to detect and analyze the affected packages. The latest attack highlights the need for improved security measures to protect against supply chain attacks.

  • The GlassWorm malware campaign has been linked to a recent supply-chain attack that exploits vulnerabilities in the Open VSX registry.
  • 72 malicious Open VSX extensions were discovered, which target developers and mimic popular developer utilities.
  • The attackers abused invisible Unicode characters to hide malicious code and injected it into GitHub and npm repositories.
  • No less than 151 GitHub repositories and two npm packages were affected by the attack.
  • The attackers used Remote Dynamic Dependencies (RDD) to modify malicious code on the fly and bypass inspection.
  • The GlassWorm campaign features heavier obfuscation and rotates Solana wallets to evade detection.
  • Developers can be tricked into uploading harmless extensions that serve as a front for malicious packages, making it difficult to detect attacks.



  • GlassWorm, a notorious malware campaign, has been linked to a recent supply-chain attack that exploits the vulnerabilities of the Open VSX registry. According to cybersecurity researchers at Socket and Endor Labs, this new iteration represents a "significant escalation" in how it propagates through the Open VSX registry.

    The attackers have abused 72 open VSX extensions to target developers, many of which mimic widely used developer utilities such as linters, formatters, code runners, and tools for artificial intelligence (AI)-powered coding assistants like Clade Code and Google Antigravity. These malicious extensions were discovered in the Open VSX registry and were found to have been uploaded by a security researcher as part of a legitimate experiment.

    However, upon further investigation, it was revealed that the packages contained invisible Unicode characters to hide malicious code. The attackers used these techniques to encode a payload and inject it into various repositories, including GitHub and npm. No less than 151 GitHub repositories were affected, and two different npm packages also fell prey to this coordinated attack.

    The malicious injections did not arrive in obviously suspicious commits, but rather surrounded by realistic changes such as documentation tweaks, version bumps, small refactors, and bug fixes that were stylistically consistent with each target project. This level of project-specific tailoring strongly suggests the attackers are using large language models to generate convincing cover commits.

    Furthermore, Endor Labs discovered 88 new malicious npm packages uploaded in three waves between November 2025 and February 2026 via 50 disposable accounts. These packages came equipped with functionality to steal sensitive information from compromised machines, including environment variables, CI/CD tokens, and system metadata. The attackers used Remote Dynamic Dependencies (RDD) to modify the malicious code on the fly and bypass inspection.

    The GlassWorm campaign is known for running checks to avoid infecting systems with a Russian locale and using Solana transactions as dead drops to fetch command-and-control servers. However, this latest iteration features heavier obfuscation and rotates Solana wallets to evade detection.

    One of the most concerning aspects of this attack is that an attacker can first upload a completely harmless VS Code extension to the marketplace to bypass review, after which it's updated to list a GlassWorm-linked package as a dependency. This makes it difficult for developers to detect malicious extensions and leaves them vulnerable to supply chain attacks.

    The use of invisible Unicode characters to encode payloads has become a hallmark of the GlassWorm campaign. The attackers have successfully deployed this technique in various repositories, including GitHub and npm. This level of sophistication highlights the need for improved security measures to protect against such complex attacks.

    In conclusion, the recent discovery of 72 malicious Open VSX extensions represents a significant escalation in the GlassWorm supply-chain attack campaign. The attackers' use of invisible Unicode characters, Remote Dynamic Dependencies, and obfuscation techniques has made it challenging for researchers to detect and analyze the affected packages. As the threat landscape continues to evolve, it is essential for developers and security professionals to remain vigilant and implement robust security measures to protect against such attacks.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/GlassWorm-Supply-Chain-Attack-Abuses-72-Open-VSX-Extensions-to-Target-Developers-ehn.shtml

  • Published: Sat Mar 14 09:32:39 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us