BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
CIPHERThreat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /GlassWorm Campaign Escalates: 72 Malicious Extensions Weaponize Open VSX Dependencies

GlassWorm Campaign Escalates: 72 Malicious Extensions Weaponize Open VSX Dependencies

March 15, 2026Malware & Threats2 min readhigh

Originally reported by The Hacker News

#supply-chain#glassworm#vscode#open-vsx#developer-targeting#malicious-extensions
Share

TL;DR

The GlassWorm supply-chain campaign has evolved its tactics to abuse Open VSX extension dependencies, allowing attackers to distribute malware through initially benign-looking extensions. Researchers identified 72 malicious extensions using this transitive dependency technique.

Why high?

This represents a significant escalation of an active supply-chain campaign targeting developers through a widely-used extension registry, with 72 compromised extensions indicating substantial reach and sophistication.

Campaign Evolution

Cybersecurity researchers have identified a significant escalation in the GlassWorm supply-chain campaign, with threat actors now exploiting Open VSX registry mechanisms to distribute malware through 72 compromised extensions. The campaign represents a tactical shift from direct malware embedding to dependency-based propagation.

The attackers now abuse extensionPack and extensionDependencies features within the Open VSX registry to create transitive malware distribution chains. This approach allows initially standalone-looking extensions to automatically pull malicious payloads through legitimate dependency mechanisms.

Technical Implementation

The evolved GlassWorm campaign leverages Open VSX's extension packaging system to create what researchers describe as transitive malware distribution. Instead of embedding loaders directly into every malicious extension listing, the threat actors structure their attack chain through dependency relationships.

This technique offers several advantages to the attackers:

  • Stealth: Initial extensions appear benign during cursory review
  • Scale: Single malicious dependency can infect multiple extension installations
  • Resilience: Distributed payload storage complicates takedown efforts
  • Legitimacy: Abuse of standard packaging mechanisms reduces detection probability

Developer Impact

The campaign specifically targets software developers through their development environment extensions. Open VSX serves as the primary extension registry for several popular code editors beyond Visual Studio Code, including VSCodium, Theia, and other open-source alternatives.

Developers installing seemingly legitimate extensions may unknowingly trigger the malicious dependency chain, potentially compromising their development environments and associated source code repositories.

Detection Challenges

The transitive nature of this attack vector presents significant challenges for both automated security scanning and manual review processes. Extension marketplaces typically focus security reviews on primary extension functionality rather than deep dependency analysis.

The distributed payload structure also complicates traditional malware detection approaches, as individual components may appear benign when analyzed in isolation.

Mitigation Recommendations

Development teams should implement several defensive measures:

  • Extension Auditing: Review extension dependency chains before installation
  • Registry Monitoring: Track installed extensions and their update patterns
  • Network Monitoring: Monitor development environments for unexpected outbound connections
  • Sandboxing: Isolate development environments from production systems

Sources

  • GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers

Originally reported by The Hacker News

Tags

#supply-chain#glassworm#vscode#open-vsx#developer-targeting#malicious-extensions

Related Intelligence

  • Week in Malware: CISA Adds n8n to KEV, Iran-Linked Wiper Hits Medical Giant

    criticalMar 12, 2026
  • AI Agent Hackerbot-Claw Compromises Microsoft, DataDog, and CNCF GitHub Repositories

    highMar 9, 2026
  • Threat Intelligence Digest: Chinese APT Campaign, Critical Router RCE, and Agent Tesla Resurgence

    highFeb 26, 2026

Related Knowledge

  • CIPHER Deep Training: Malware Analysis, Reverse Engineering, and Evasion Techniques

    offensive
  • Malware Analysis Deep Dive — CIPHER Training Module

    dfir
  • DFIR & Threat Hunting Deep Training — CIPHER Knowledge Base

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Microsoft Ships OOB Hotpatch for Windows 11 Enterprise RRAS RCE Vulnerability

Next Article

CNCERT Warns of Security Flaws in OpenClaw AI Agent Platform →