Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

0
Medium
Vulnerabilityrce
Published: Mon Feb 02 2026 (02/02/2026, 05:04:00 UTC)
Source: The Hacker News

Description

Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developer's resources to push malicious updates to downstream users. "On January 30, 2026, four established Open VSX extensions published by the oorzc author had malicious versions published to Open VSX that embed the GlassWorm

AI-Powered Analysis

AILast updated: 02/02/2026, 05:12:13 UTC

Technical Analysis

On January 30, 2026, threat actors executed a supply chain attack against the Open VSX Registry by compromising the publishing credentials of a legitimate developer known as 'oorzc'. This allowed them to push malicious updates to four established Open VSX extensions: FTP/SFTP/SSH Sync Tool, I18n Tools, vscode mindmap, and scss to css. These extensions, collectively downloaded over 22,000 times, were weaponized to deliver the GlassWorm malware loader. GlassWorm is a sophisticated malware known for its runtime decryption and use of EtherHiding, a technique that conceals command-and-control (C2) communications by embedding them in blockchain transactions (Solana memos). The malware activates only after profiling the infected machine to exclude Russian locales, a tactic to evade local law enforcement. Once active, GlassWorm harvests a wide range of sensitive information including browser data (logins, cookies, history), cryptocurrency wallet files (Electrum, Exodus, Ledger Live, etc.), Apple macOS credentials (iCloud Keychain, Safari cookies), Apple Notes documents, FortiClient VPN configs, and developer credentials such as AWS and SSH keys. The malware also inspects npm and GitHub authentication tokens, enabling attackers to access private repositories, continuous integration secrets, and release automation pipelines. This attack is notable for using a compromised developer account to distribute malware, contrasting with prior GlassWorm campaigns that relied on typosquatting or brandjacking. The use of encrypted loaders and dynamic C2 infrastructure rotation complicates detection via static indicators, shifting the defender advantage towards behavioral analytics and rapid response. The incident underscores the critical risks posed by supply chain attacks in open-source extension ecosystems, especially those targeting developer tools that can facilitate deeper enterprise compromise.

Potential Impact

European organizations using Open VSX extensions, particularly those relying on the affected developer tools, face significant risks from this supply chain attack. The theft of developer credentials and cloud authentication tokens can lead to unauthorized access to private code repositories, CI/CD pipelines, and cloud infrastructure, enabling lateral movement and data exfiltration. The malware’s ability to harvest cryptocurrency wallets and sensitive macOS credentials poses direct financial risks and potential identity theft. Enterprises with macOS-based development environments or those using FortiClient VPN are especially vulnerable. The selective activation excluding Russian locales suggests a threat actor motivated to avoid local prosecution, indicating a persistent and targeted campaign. The attack undermines trust in open-source supply chains and highlights the need for stringent credential management and supply chain security. Given the widespread use of Open VSX extensions across Europe, the potential for widespread impact exists, particularly in sectors with high dependency on developer tools such as technology, finance, and research institutions.

Mitigation Recommendations

European organizations should immediately audit their use of Open VSX extensions, particularly those published by the 'oorzc' author, and remove or update any affected versions. Implement multi-factor authentication (MFA) and rotate all developer publishing credentials to prevent unauthorized access. Employ behavioral detection tools capable of identifying runtime-decrypted payloads and unusual network activity such as blockchain-based C2 communications. Conduct thorough endpoint detection and response (EDR) investigations focusing on macOS systems to identify indicators of GlassWorm infection. Secure developer environments by isolating build and publishing processes, and monitor npm and GitHub tokens for unauthorized use. Enforce strict access controls on cloud and CI/CD environments, and audit logs for suspicious activity. Educate developers on supply chain risks and encourage the use of signed and verified extensions. Collaborate with Open VSX Registry maintainers to enhance security measures around extension publishing and token management. Finally, implement network segmentation to limit lateral movement if compromise occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/open-vsx-supply-chain-attack-used.html","fetched":true,"fetchedAt":"2026-02-02T05:11:55.129Z","wordCount":1144}

Threat ID: 6980321bac06320222b73f62

Added to database: 2/2/2026, 5:11:55 AM

Last enriched: 2/2/2026, 5:12:13 AM

Last updated: 2/3/2026, 7:29:08 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats