Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack

0
Medium
Malware
Published: Mon Feb 02 2026 (02/02/2026, 14:12:50 UTC)
Source: SecurityWeek

Description

A hacker published malicious versions of four established VS Code extensions to distribute a GlassWorm malware loader. The post Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack appeared first on SecurityWeek .

AI-Powered Analysis

AILast updated: 02/02/2026, 14:14:34 UTC

Technical Analysis

The recent attack involves the hijacking of a publisher account on Open VSX, an open-source marketplace for Visual Studio Code extensions. The attacker published malicious versions of four well-known VS Code extensions, embedding the GlassWorm malware loader within them. GlassWorm is a sophisticated malware family known for its stealth capabilities, persistence mechanisms, and potential to exfiltrate sensitive data. By compromising trusted extensions, the attacker exploits the software supply chain, a vector that can bypass traditional security controls because users inherently trust these extensions. The malicious extensions, once installed by developers or organizations, can execute the GlassWorm loader, which may then deploy additional payloads or establish backdoors. Although no active exploitation has been confirmed in the wild, the presence of malicious code in popular extensions poses a significant risk to the development environments and downstream applications. This attack highlights the vulnerability of open-source extension ecosystems to account hijacking and supply chain attacks, emphasizing the need for rigorous publisher account security and extension vetting.

Potential Impact

European organizations, particularly those heavily reliant on Visual Studio Code and Open VSX extensions for software development, face risks including unauthorized access to source code, intellectual property theft, and potential lateral movement within corporate networks. The GlassWorm malware's stealth and persistence capabilities could lead to prolonged undetected compromises, data exfiltration, and disruption of development workflows. Critical infrastructure and technology firms in Europe could be targeted to gain footholds for broader cyber espionage or sabotage campaigns. The supply chain nature of this attack means that even well-secured organizations could be compromised if developers install the malicious extensions. This could undermine trust in open-source ecosystems and lead to increased operational costs due to incident response and remediation efforts.

Mitigation Recommendations

Organizations should immediately audit their development environments for the presence of the compromised extensions and remove any suspicious versions. Developers must verify extension sources, preferring official marketplaces with stringent security controls and multi-factor authentication for publisher accounts. Implementing strict code signing and integrity verification for extensions can help detect tampering. Network monitoring should be enhanced to detect unusual outbound connections indicative of GlassWorm activity. Security teams should educate developers about supply chain risks and enforce policies restricting installation of extensions from unverified sources. Additionally, Open VSX and similar platforms must enforce stronger account security measures, including mandatory multi-factor authentication and anomaly detection for publisher accounts. Regularly updating and patching development tools and extensions is critical to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 6980b13af9fa50a62f450ed0

Added to database: 2/2/2026, 2:14:18 PM

Last enriched: 2/2/2026, 2:14:34 PM

Last updated: 2/3/2026, 10:48:48 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats