By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
Computing

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

News Room
Last updated: 2026/02/02 at 12:15 AM
News Room Published 2 February 2026
Share
Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
SHARE

Ravie LakshmananFeb 02, 2026Developer Tools / Malware

Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developer’s resources to push malicious updates to downstream users.

“On January 30, 2026, four established Open VSX extensions published by the oorzc author had malicious versions published to Open VSX that embed the GlassWorm malware loader,” Socket security researcher Kirill Boychenko said in a Saturday report.

“These extensions had previously been presented as legitimate developer utilities (some first published more than two years ago) and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases.”

The supply chain security company said that the supply chain attack involved the compromise of the developer’s publishing credentials, with the Open VSX security team assessing the incident as involving the use of either a leaked token or other unauthorized access. The malicious versions have since been removed from the Open VSX.

Cybersecurity

The list of identified extensions is below –

  • FTP/SFTP/SSH Sync Tool (oorzc.ssh-tools — version 0.5.1)
  • I18n Tools (oorzc.i18n-tools-plus — version 1.6.8)
  • vscode mindmap (oorzc.mind-map — version 1.0.61)
  • scss to css (oorzc.scss-to-css-compile — version 1.3.4)

The poisoned versions, Socket noted, are designed to deliver a loader malware associated with a known campaign called GlassWorm. The loader is equipped to decrypt and run embedded at runtime, uses an increasingly weaponized technique called EtherHiding to fetch command-and-control (C2) endpoints, and ultimately run code designed to steal Apple macOS credentials and cryptocurrency wallet data.

At the same time, the malware is detonated only after the compromised machine has been profiled, and it has been determined that it does not correspond to a Russian locale, a pattern commonly observed in malicious programs originating from or affiliated with Russian-speaking threat actors to avoid domestic prosecution.

The kinds of information harvested by the malware include –

  • Data from Mozilla Firefox and Chromium-based browsers (logins, cookies, internet history, and wallet extensions like MetaMask)
  • Cryptocurrency wallet files (Electrum, Exodus, Atomic, Ledger Live, Trezor Suite, Binance, and TonKeeper)
  • iCloud Keychain database
  • Safari cookies
  • Data from Apple Notes
  • user documents from Desktop, Documents, and Downloads folders
  • FortiClient VPN configuration files
  • Developer credentials (e.g., ~/.aws and ~/.ssh)

The targeting of developer information poses severe risks as it exposes enterprise environments to potential cloud account compromise and lateral movement attacks.

Cybersecurity

“The payload includes routines to locate and extract authentication material used in common workflows, including inspecting npm configuration for _authToken and referencing GitHub authentication artifacts, which can provide access to private repositories, CI secrets, and release automation,” Boychenko said.

A significant aspect of the attack is that it diverges from previously observed GlassWorm indicators in that it makes use of a compromised account belonging to a legitimate developer to distribute the malware. In prior instances, the threat actors behind the campaign have leveraged typosquatting and brandjacking to upload fraudulent extensions for subsequent propagation.

“The threat actor blends into normal developer workflows, hides execution behind encrypted, runtime-decrypted loaders, and uses Solana memos as a dynamic dead drop to rotate staging infrastructure without republishing extensions,” Socket said. “These design choices reduce the value of static indicators and shift defender advantage toward behavioral detection and rapid response.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article 10 Of The Worst Home Appliances From 2025 According To Consumer Reports – BGR 10 Of The Worst Home Appliances From 2025 According To Consumer Reports – BGR
Next Article Samsung Galaxy F70e set to launch in India soon: Everything you need to know Samsung Galaxy F70e set to launch in India soon: Everything you need to know
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

New MacBook Pro release date: Here’s when M5 Pro and M5 Max might debut – 9to5Mac
New MacBook Pro release date: Here’s when M5 Pro and M5 Max might debut – 9to5Mac
News
3 Clever Uses For Your Old Video Game Controllers – BGR
3 Clever Uses For Your Old Video Game Controllers – BGR
News
Nigeria’s digital economy is scaling fast. Is spectrum ready?
Nigeria’s digital economy is scaling fast. Is spectrum ready?
Computing
A trusted leaker just gave us a close look at the Galaxy S26 Ultra
A trusted leaker just gave us a close look at the Galaxy S26 Ultra
News

You Might also Like

Nigeria’s digital economy is scaling fast. Is spectrum ready?
Computing

Nigeria’s digital economy is scaling fast. Is spectrum ready?

13 Min Read
👨🏿‍🚀 Daily – CinetPay’s .2M problem |
Computing

👨🏿‍🚀 Daily – CinetPay’s $1.2M problem |

2 Min Read
eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
Computing

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

6 Min Read
NVIDIA CEO says TSMC needs to double capacity in a decade to support historic infrastructure buildout · TechNode
Computing

NVIDIA CEO says TSMC needs to double capacity in a decade to support historic infrastructure buildout · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?