Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developer's resources to push malicious updates to downstream users. "On January 30, 2026, four established Open VSX extensions published by the oorzc author had malicious versions published to Open VSX that embed the GlassWorm
AI Analysis
Technical Summary
On January 30, 2026, threat actors executed a supply chain attack against the Open VSX Registry by compromising the publishing credentials of a legitimate developer known as 'oorzc'. This allowed them to push malicious updates to four established Open VSX extensions: FTP/SFTP/SSH Sync Tool, I18n Tools, vscode mindmap, and scss to css. These extensions, collectively downloaded over 22,000 times, were weaponized to deliver the GlassWorm malware loader. GlassWorm is a sophisticated malware known for its runtime decryption and use of EtherHiding, a technique that conceals command-and-control (C2) communications by embedding them in blockchain transactions (Solana memos). The malware activates only after profiling the infected machine to exclude Russian locales, a tactic to evade local law enforcement. Once active, GlassWorm harvests a wide range of sensitive information including browser data (logins, cookies, history), cryptocurrency wallet files (Electrum, Exodus, Ledger Live, etc.), Apple macOS credentials (iCloud Keychain, Safari cookies), Apple Notes documents, FortiClient VPN configs, and developer credentials such as AWS and SSH keys. The malware also inspects npm and GitHub authentication tokens, enabling attackers to access private repositories, continuous integration secrets, and release automation pipelines. This attack is notable for using a compromised developer account to distribute malware, contrasting with prior GlassWorm campaigns that relied on typosquatting or brandjacking. The use of encrypted loaders and dynamic C2 infrastructure rotation complicates detection via static indicators, shifting the defender advantage towards behavioral analytics and rapid response. The incident underscores the critical risks posed by supply chain attacks in open-source extension ecosystems, especially those targeting developer tools that can facilitate deeper enterprise compromise.
Potential Impact
European organizations using Open VSX extensions, particularly those relying on the affected developer tools, face significant risks from this supply chain attack. The theft of developer credentials and cloud authentication tokens can lead to unauthorized access to private code repositories, CI/CD pipelines, and cloud infrastructure, enabling lateral movement and data exfiltration. The malware’s ability to harvest cryptocurrency wallets and sensitive macOS credentials poses direct financial risks and potential identity theft. Enterprises with macOS-based development environments or those using FortiClient VPN are especially vulnerable. The selective activation excluding Russian locales suggests a threat actor motivated to avoid local prosecution, indicating a persistent and targeted campaign. The attack undermines trust in open-source supply chains and highlights the need for stringent credential management and supply chain security. Given the widespread use of Open VSX extensions across Europe, the potential for widespread impact exists, particularly in sectors with high dependency on developer tools such as technology, finance, and research institutions.
Mitigation Recommendations
European organizations should immediately audit their use of Open VSX extensions, particularly those published by the 'oorzc' author, and remove or update any affected versions. Implement multi-factor authentication (MFA) and rotate all developer publishing credentials to prevent unauthorized access. Employ behavioral detection tools capable of identifying runtime-decrypted payloads and unusual network activity such as blockchain-based C2 communications. Conduct thorough endpoint detection and response (EDR) investigations focusing on macOS systems to identify indicators of GlassWorm infection. Secure developer environments by isolating build and publishing processes, and monitor npm and GitHub tokens for unauthorized use. Enforce strict access controls on cloud and CI/CD environments, and audit logs for suspicious activity. Educate developers on supply chain risks and encourage the use of signed and verified extensions. Collaborate with Open VSX Registry maintainers to enhance security measures around extension publishing and token management. Finally, implement network segmentation to limit lateral movement if compromise occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland, Poland, Italy, Spain
Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
Description
Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developer's resources to push malicious updates to downstream users. "On January 30, 2026, four established Open VSX extensions published by the oorzc author had malicious versions published to Open VSX that embed the GlassWorm
AI-Powered Analysis
Technical Analysis
On January 30, 2026, threat actors executed a supply chain attack against the Open VSX Registry by compromising the publishing credentials of a legitimate developer known as 'oorzc'. This allowed them to push malicious updates to four established Open VSX extensions: FTP/SFTP/SSH Sync Tool, I18n Tools, vscode mindmap, and scss to css. These extensions, collectively downloaded over 22,000 times, were weaponized to deliver the GlassWorm malware loader. GlassWorm is a sophisticated malware known for its runtime decryption and use of EtherHiding, a technique that conceals command-and-control (C2) communications by embedding them in blockchain transactions (Solana memos). The malware activates only after profiling the infected machine to exclude Russian locales, a tactic to evade local law enforcement. Once active, GlassWorm harvests a wide range of sensitive information including browser data (logins, cookies, history), cryptocurrency wallet files (Electrum, Exodus, Ledger Live, etc.), Apple macOS credentials (iCloud Keychain, Safari cookies), Apple Notes documents, FortiClient VPN configs, and developer credentials such as AWS and SSH keys. The malware also inspects npm and GitHub authentication tokens, enabling attackers to access private repositories, continuous integration secrets, and release automation pipelines. This attack is notable for using a compromised developer account to distribute malware, contrasting with prior GlassWorm campaigns that relied on typosquatting or brandjacking. The use of encrypted loaders and dynamic C2 infrastructure rotation complicates detection via static indicators, shifting the defender advantage towards behavioral analytics and rapid response. The incident underscores the critical risks posed by supply chain attacks in open-source extension ecosystems, especially those targeting developer tools that can facilitate deeper enterprise compromise.
Potential Impact
European organizations using Open VSX extensions, particularly those relying on the affected developer tools, face significant risks from this supply chain attack. The theft of developer credentials and cloud authentication tokens can lead to unauthorized access to private code repositories, CI/CD pipelines, and cloud infrastructure, enabling lateral movement and data exfiltration. The malware’s ability to harvest cryptocurrency wallets and sensitive macOS credentials poses direct financial risks and potential identity theft. Enterprises with macOS-based development environments or those using FortiClient VPN are especially vulnerable. The selective activation excluding Russian locales suggests a threat actor motivated to avoid local prosecution, indicating a persistent and targeted campaign. The attack undermines trust in open-source supply chains and highlights the need for stringent credential management and supply chain security. Given the widespread use of Open VSX extensions across Europe, the potential for widespread impact exists, particularly in sectors with high dependency on developer tools such as technology, finance, and research institutions.
Mitigation Recommendations
European organizations should immediately audit their use of Open VSX extensions, particularly those published by the 'oorzc' author, and remove or update any affected versions. Implement multi-factor authentication (MFA) and rotate all developer publishing credentials to prevent unauthorized access. Employ behavioral detection tools capable of identifying runtime-decrypted payloads and unusual network activity such as blockchain-based C2 communications. Conduct thorough endpoint detection and response (EDR) investigations focusing on macOS systems to identify indicators of GlassWorm infection. Secure developer environments by isolating build and publishing processes, and monitor npm and GitHub tokens for unauthorized use. Enforce strict access controls on cloud and CI/CD environments, and audit logs for suspicious activity. Educate developers on supply chain risks and encourage the use of signed and verified extensions. Collaborate with Open VSX Registry maintainers to enhance security measures around extension publishing and token management. Finally, implement network segmentation to limit lateral movement if compromise occurs.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/02/open-vsx-supply-chain-attack-used.html","fetched":true,"fetchedAt":"2026-02-02T05:11:55.129Z","wordCount":1144}
Threat ID: 6980321bac06320222b73f62
Added to database: 2/2/2026, 5:11:55 AM
Last enriched: 2/2/2026, 5:12:13 AM
Last updated: 2/3/2026, 7:29:08 AM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24449: Use of weak credentials in ELECOM CO.,LTD. WRC-X1500GS-B
MediumCVE-2026-20704: Cross-site request forgery (CSRF) in ELECOM CO.,LTD. WRC-X1500GS-B
MediumCVE-2026-1447: CWE-352 Cross-Site Request Forgery (CSRF) in getwpfunnels Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more
MediumCVE-2026-1210: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in thehappymonster Happy Addons for Elementor
MediumCVE-2025-58381: CWE-35: Path Traversal in Brocade Fabric OS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.