Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GlassWorm Exploits VSX Extensions to Target Developers

GlassWorm Exploits VSX Extensions to Target Developers

Posted on February 3, 2026 By CWS

Key Points

  • GlassWorm compromises VSX extensions, impacting over 22,000 downloads.
  • Malicious updates deployed through a trusted publisher account.
  • Focus on macOS systems, targeting sensitive developer data.

GlassWorm Threatens Developer Security

A recent cybersecurity incident involving GlassWorm has raised significant concerns among developers utilizing the Open VSX Registry. Trusted VSX extensions, commonly used for development tasks, were covertly transformed into malware carriers, affecting over 22,000 downloads.

The threat actors executed their scheme by compromising a trusted publisher account. This allowed them to release updates that appeared legitimate but were, in fact, laced with a staged loader designed to deploy malware.

Impact of Compromised Extensions

The affected extensions were integral to several developer workflows, including file synchronization, internationalization, mind mapping, and CSS conversion. This breach turned routine development activities into potential security threats.

Security analysts at Socket.dev identified the attack as a supply chain compromise, likely due to unauthorized access to the oorzc publisher account. Developers who unknowingly installed these malicious updates risked deploying the GlassWorm loader without any visible alerts.

Despite the Open VSX security team’s swift action to remove the malicious extensions and revoke tokens, the incident’s exposure duration has sparked serious concerns about the potential misuse of stolen credentials.

Advanced Techniques and MacOS Focus

GlassWorm’s latest campaign demonstrates an escalation in its attack strategies. Instead of relying on counterfeit projects, the malware was embedded in legitimate, long-standing extensions, enhancing its concealment.

While GlassWorm’s operations span multiple platforms, its primary focus remains on macOS systems. The malware is designed to steal browser data, cryptocurrency wallets, SSH keys, AWS credentials, and other sensitive developer information.

This evolution from simple theft to supply chain infiltration indicates that a single compromised device can quickly escalate to cloud environments and CI pipelines.

Conclusion

The GlassWorm incident underscores the critical need for robust security measures in developer environments. As attackers refine their techniques, safeguarding supply chains and monitoring extension updates become paramount to prevent similar breaches in the future.

Cyber Security News Tags:Cybersecurity, developer security, GlassWorm, Malware, Open VSX, supply chain attack, VSX extensions

Post navigation

Previous Post: Advanced PDFly Malware Variant Utilizes Custom Encryption
Next Post: Growing Infostealer Threat Targets macOS Using Python

Related Posts

Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations Cyber Security News
New BOF Tool Exploits Microsoft Teams’ Cookie Encryption allowing Attackers to Access User Chats New BOF Tool Exploits Microsoft Teams’ Cookie Encryption allowing Attackers to Access User Chats Cyber Security News
Researchers Details Masking Malicious Scripts and Bypass Defense Mechanisms Researchers Details Masking Malicious Scripts and Bypass Defense Mechanisms Cyber Security News
Mongobleed PoC Exploit Tool Released for MongoDB Flaw that Exposes Sensitive Data Mongobleed PoC Exploit Tool Released for MongoDB Flaw that Exposes Sensitive Data Cyber Security News
Arkana Ransomware Claimed to Have Stolen 2.2 Million Customer Records Arkana Ransomware Claimed to Have Stolen 2.2 Million Customer Records Cyber Security News
New DroidLock Malware Locks Android Devices and Demands a Ransom New DroidLock Malware Locks Android Devices and Demands a Ransom Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News