Dozens of Open VSX Extension Clones Linked to GlassWorm Malware
Over 70 cloned extensions on the Open VSX marketplace have been identified as likely sleeper extensions linked to the GlassWorm malware. These extensions impersonate legitimate ones to gain user trust and are designed to deploy malware through future updates. GlassWorm malware steals credentials and sensitive information and uses sophisticated evasion techniques, including hiding code with Unicode variation selectors and leveraging blockchain-based command-and-control infrastructure. At least six of these cloned extensions have been activated. The threat actor uses multiple delivery mechanisms, including bundled native binaries and remote payload retrieval, to evade detection.
AI Analysis
Technical Summary
In April 2026, security researchers identified over 70 cloned extensions on the Open VSX marketplace that are linked to the GlassWorm malware campaign. GlassWorm first appeared in October 2025 and targets GitHub, Git, and NPM credentials, as well as cryptocurrency. The cloned extensions mimic legitimate ones in appearance but are published by newly created GitHub accounts with minimal activity. These extensions initially appear benign but are designed as sleeper agents to deliver malware through updates. The malware employs obfuscation techniques such as Unicode variation selectors and uses the Solana blockchain for command-and-control. Delivery methods include bundled native binaries and remote payload downloads, complicating detection efforts.
Potential Impact
The GlassWorm-linked cloned extensions pose a risk of credential theft (GitHub, Git, NPM), sensitive data compromise, and cryptocurrency theft. By impersonating trusted extensions, they increase the likelihood of user installation and subsequent infection. The malware's use of multiple evasion and delivery techniques makes detection and prevention more challenging. At least six extensions have already been activated, indicating active exploitation potential. The threat affects users of the Open VSX extension marketplace and potentially other open source software ecosystems.
Mitigation Recommendations
No official patch or remediation is indicated for the Open VSX extensions themselves. Users should avoid installing extensions from untrusted or newly created publishers, especially those with minimal GitHub activity or suspicious naming patterns. Monitoring for updates to installed extensions and verifying publisher authenticity can reduce risk. Security teams should be aware of the GlassWorm campaign's tactics and consider additional endpoint protections to detect unusual extension behavior. Patch status is not yet confirmed — check vendor advisories and Open VSX marketplace updates for current remediation guidance.
Dozens of Open VSX Extension Clones Linked to GlassWorm Malware
Description
Over 70 cloned extensions on the Open VSX marketplace have been identified as likely sleeper extensions linked to the GlassWorm malware. These extensions impersonate legitimate ones to gain user trust and are designed to deploy malware through future updates. GlassWorm malware steals credentials and sensitive information and uses sophisticated evasion techniques, including hiding code with Unicode variation selectors and leveraging blockchain-based command-and-control infrastructure. At least six of these cloned extensions have been activated. The threat actor uses multiple delivery mechanisms, including bundled native binaries and remote payload retrieval, to evade detection.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
In April 2026, security researchers identified over 70 cloned extensions on the Open VSX marketplace that are linked to the GlassWorm malware campaign. GlassWorm first appeared in October 2025 and targets GitHub, Git, and NPM credentials, as well as cryptocurrency. The cloned extensions mimic legitimate ones in appearance but are published by newly created GitHub accounts with minimal activity. These extensions initially appear benign but are designed as sleeper agents to deliver malware through updates. The malware employs obfuscation techniques such as Unicode variation selectors and uses the Solana blockchain for command-and-control. Delivery methods include bundled native binaries and remote payload downloads, complicating detection efforts.
Potential Impact
The GlassWorm-linked cloned extensions pose a risk of credential theft (GitHub, Git, NPM), sensitive data compromise, and cryptocurrency theft. By impersonating trusted extensions, they increase the likelihood of user installation and subsequent infection. The malware's use of multiple evasion and delivery techniques makes detection and prevention more challenging. At least six extensions have already been activated, indicating active exploitation potential. The threat affects users of the Open VSX extension marketplace and potentially other open source software ecosystems.
Mitigation Recommendations
No official patch or remediation is indicated for the Open VSX extensions themselves. Users should avoid installing extensions from untrusted or newly created publishers, especially those with minimal GitHub activity or suspicious naming patterns. Monitoring for updates to installed extensions and verifying publisher authenticity can reduce risk. Security teams should be aware of the GlassWorm campaign's tactics and consider additional endpoint protections to detect unusual extension behavior. Patch status is not yet confirmed — check vendor advisories and Open VSX marketplace updates for current remediation guidance.
Technical Details
- Article Source
- {"url":"https://www.securityweek.com/dozens-of-open-vsx-extension-clones-linked-to-glassworm-malware/","fetched":true,"fetchedAt":"2026-04-28T12:51:22.258Z","wordCount":1021}
Threat ID: 69f0ad4acbff5d86100ca8ce
Added to database: 4/28/2026, 12:51:22 PM
Last enriched: 4/28/2026, 12:51:34 PM
Last updated: 4/29/2026, 5:52:43 AM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.