Threat Advisory

GlassWorm Loader Hits Open VSX via Developer Account Compromise

Threat: Supply chain attack
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High

EXECUTIVE SUMMARY:

A supply-chain security incident revealed the abuse of the Open VSX Registry to distribute the GlassWorm malware loader through trusted development tools. Threat actors gained unauthorized access to a legitimate extension developer account and used it to publish malicious updates to several popular Visual Studio Code extensions. These extensions had an established user base and significant adoption, which allowed the malicious code to reach a wide audience without raising immediate suspicion. Instead of creating new fake packages or relying on typosquatting, the attackers leveraged the inherent trust users place in existing tools and routine updates. This approach highlights a growing shift in attacker strategy toward compromising software publishers directly, making detection more difficult and increasing the potential impact. By embedding the malware within legitimate extension updates, the campaign bypassed many traditional security controls and user caution. The incident underscores how developer ecosystems have become high-value targets and demonstrates the risks associated with relying on third-party extensions without continuous monitoring and verification of their integrity.

The compromised extensions contained a staged malware loader designed to execute malicious payloads while minimizing detection. Upon activation, the loader performed environment checks to determine whether execution conditions were suitable, including language and system profiling to avoid certain regions. Rather than relying on a static command-and-control server, the malware used blockchain transaction metadata as a dynamic mechanism to retrieve additional instructions and payloads, allowing the attackers to update behavior without modifying the extension itself. Once fully deployed, the second-stage payload focused primarily on macOS systems and operated as an information-stealing implant. It harvested browser data, authentication material, cryptocurrency wallet files, VPN configurations, and developer-related secrets such as cloud credentials and SSH keys. Collected data was archived and exfiltrated to attacker-controlled infrastructure. To maintain long-term access, the malware established persistence through system startup mechanisms, ensuring execution on user login. The combination of encryption, decentralized command retrieval, and targeted data collection demonstrates a mature and carefully engineered malware operation.

This GlassWorm operation illustrates a malware campaign that exploits trust within software supply chains rather than technical vulnerabilities alone. By compromising a legitimate developer account, the attackers significantly increased the likelihood of successful infections and reduced the chance of early detection. The incident highlights the cascading risk such compromises pose, as infected developer machines may lead to further credential theft and secondary breaches across cloud platforms, repositories, and enterprise environments. Mitigation requires more than simply removing affected extensions; users and organizations must assume potential credential exposure and take corrective actions such as rotating secrets, auditing systems for persistence artifacts, and reviewing access logs. From a broader perspective, the campaign reinforces the importance of stronger publisher protections, including multi-factor authentication, tighter token management, and continuous behavioral analysis of published updates. As developer ecosystems continue to grow, defending the software supply chain must be treated as a core security priority rather than an afterthought.

THREAT PROFILE:

Tactic Technique ID Technique Sub-Technique
Initial Access T1195.002 Supply Chain Compromise Compromise Software Supply Chain
Execution T1059.007 Command and Scripting Interpreter JavaScript
Persistence T1547.001 Boot or Logon Autostart Execution Launch Agent
Defense Evasion T1027 Obfuscated Files or Information
T1036 Masquerading
Credential Access T1555.001 Credentials from Password Stores Keychain
T1552.001 Unsecured Credentials Credentials in Files
Discovery T1082 System Information Discovery
T1614.001 System Location Discovery System Language Discovery
Collection T1005 Data from Local System
Command and Control T1071.001 Application Layer Protocol Web Protocols
Exfiltration T1041 Exfiltration Over C2 Channel

REFERENCES:

The following reports contain further technical details:

https://securityonline.info/open-vsx-hijacked-glassworm-malware-poisons-vs-code-extensions/

https://socket.dev/blog/glassworm-loader-hits-open-vsx-via-suspected-developer-account-compromise

crossmenu