← Back to Tech & Science

GlassWorm Campaign Targets OpenVSX with 73 Malicious Extensions

Tech & ScienceAI-Generated & Algorithmically Scored··1 UPDATE

AI-generated from multiple sources. Verify before acting on this reporting.

Update

LONDON (AP) — Additional reports have confirmed the scope of the GlassWorm campaign targeting the OpenVSX ecosystem. New information indicates that the malicious extensions have been identified in further instances beyond the initial detection. The campaign continues to pose a significant threat to developers relying on the registry for tools and utilities. Security teams are actively working to mitigate the impact and prevent further distribution of the compromised extensions. The situation remains fluid as more details emerge regarding the extent of the infiltration and the specific methods employed by the attackers. Users are advised to exercise caution and review their installed extensions for any signs of compromise. The ongoing investigation aims to uncover the full reach of the campaign and identify any additional vulnerabilities that may have been exploited. As the situation develops, further updates will be provided to keep the community informed of the latest developments and recommended actions.

Original Report —

LONDON (AP) — A sophisticated cyberattack campaign known as GlassWorm has infiltrated the OpenVSX ecosystem, deploying 73 malicious extensions designed to steal cryptocurrency wallets and developer credentials. The attack, detected on April 27, 2026, represents a significant escalation in supply chain compromises targeting the global developer community.

The malicious extensions were distributed through the OpenVSX registry, a popular alternative to the official Visual Studio Code marketplace. Security researchers identified the malware as part of a broader operation aimed at exfiltrating sensitive data from developers' machines. Unlike typical malware that activates immediately, these extensions function as "sleepers," remaining dormant until a specific update triggers their malicious payloads.

The campaign targets a wide range of high-value assets, including private keys for cryptocurrency wallets, authentication tokens, and proprietary code. By embedding themselves within legitimate-looking development tools, the attackers bypass traditional security measures that scan for active threats. The dormant nature of the malware allows it to persist in systems for extended periods, waiting for the right moment to execute its payload.

OpenVSX administrators have initiated an emergency review of the registry to identify and remove the compromised extensions. The platform, which hosts thousands of extensions for developers worldwide, is working to mitigate the impact of the attack. Users are advised to audit their installed extensions and update their security protocols immediately.

The GlassWorm campaign marks a shift in tactics for cybercriminals targeting the software supply chain. Previous attacks have focused on direct compromises of popular packages, but this operation leverages the trust developers place in extension marketplaces. The use of sleeper mechanisms indicates a high level of planning and technical sophistication, suggesting the involvement of an organized threat actor.

Security experts warn that the full scope of the attack may not be immediately apparent. The dormant nature of the malware means that some infected systems may not show signs of compromise until the payload is triggered. This delay could allow attackers to gather intelligence or wait for optimal conditions to execute their theft.

The incident highlights the growing vulnerability of open-source ecosystems to supply chain attacks. As developers increasingly rely on third-party extensions to enhance their productivity, the risk of malicious code infiltrating these tools continues to rise. The OpenVSX community is urging users to exercise caution and verify the authenticity of extensions before installation.

Questions remain about the identity of the attackers and the extent of the data already compromised. While the immediate threat has been identified, the long-term implications of the GlassWorm campaign are still unfolding. Security firms are monitoring the situation closely, looking for signs of further activity or new variants of the malware.

The attack serves as a stark reminder of the need for robust security measures in the software development lifecycle. As the investigation continues, developers and platform administrators are working to strengthen defenses against future supply chain compromises.