Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GlassWorm Attack Exploits Open VSX Extensions to Target Developers

GlassWorm Attack Exploits Open VSX Extensions to Target Developers

Posted on March 14, 2026 By CWS

Cybersecurity experts have identified a new wave of the GlassWorm campaign, which marks a significant intensification in its spread via the Open VSX registry. This development highlights the evolving tactics of the attackers, who now exploit extensionPack and extensionDependencies, transforming initially benign extensions into vehicles for malware delivery in subsequent updates. This strategy enables a seemingly harmless package to later download a GlassWorm-linked extension after trust has been established, according to Socket’s recent findings.

Expansion of Malicious Extensions

Since January 2026, at least 72 additional malicious Open VSX extensions have been discovered. These extensions disguise themselves as popular developer tools, including linters, formatters, and AI-powered coding assistants like Clade Code and Google Antigravity. Some identified extensions, such as angular-studio.ng-angular-extension and tamokill12.foundry-pdf-extension, have been removed by Open VSX.

The GlassWorm campaign, known for infiltrating Microsoft Visual Studio Marketplace and Open VSX, aims to steal sensitive information and misuse infected systems for criminal activities. Initially reported by Koi Security in late 2025, similar tactics using invisible Unicode characters were found in npm packages as early as March 2025.

New Tactics and Techniques

Maintaining its core features, the latest GlassWorm iteration introduces heavier obfuscation and rotation of Solana wallets to evade detection. The campaign leverages extension relationships to deploy malicious payloads, akin to npm packages’ use of rogue dependencies. This approach allows attackers to bypass reviews by first uploading a harmless VS Code extension, then updating it to include a GlassWorm-linked package as a dependency.

Aikido’s advisory attributes the GlassWorm threat to a mass campaign affecting open-source repositories, utilizing invisible Unicode characters to encode payloads. This technique has impacted over 151 GitHub repositories between March 3 and March 9, 2026, and was also used in npm packages like @aifabrix/miso-client.

Implications and Future Outlook

In a related development, Endor Labs uncovered 88 new malicious npm packages uploaded from November 2025 to February 2026 using Remote Dynamic Dependencies (RDD). This method allows operators to modify malicious code on the fly, bypassing inspections. Although initially linked to the PhantomRaven campaign, these packages were later attributed to a security researcher’s experiment, raising questions about transparency and security risks.

These findings emphasize the importance of vigilance and improved security measures in software development environments. As attackers continue to refine their techniques, developers and security professionals must stay informed and adopt robust protective strategies to mitigate these evolving threats.

The Hacker News Tags:Cybersecurity, Developers, extension vulnerabilities, GlassWorm, Malware, npm packages, Open VSX, Security, supply chain attack, Visual Studio

Post navigation

Previous Post: HPE AOS-CX Flaw Allows Admin Password Resets
Next Post: OpenClaw AI Vulnerabilities Pose Security Threats

Related Posts

Why CTEM is the Winning Bet for CISOs in 2025 Why CTEM is the Winning Bet for CISOs in 2025 The Hacker News
New China-Linked Hacker Group Hits Governments With Stealth Malware New China-Linked Hacker Group Hits Governments With Stealth Malware The Hacker News
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services The Hacker News
New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries The Hacker News
Cybercrime Group Recruits Women for IT Vishing Cybercrime Group Recruits Women for IT Vishing The Hacker News
Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenClaw AI Vulnerabilities Pose Security Threats
  • GlassWorm Attack Exploits Open VSX Extensions to Target Developers
  • HPE AOS-CX Flaw Allows Admin Password Resets
  • Malicious npm Packages Exploit Discord and Crypto Wallets
  • GlassWorm Campaign Expands via Malicious VSX Extensions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenClaw AI Vulnerabilities Pose Security Threats
  • GlassWorm Attack Exploits Open VSX Extensions to Target Developers
  • HPE AOS-CX Flaw Allows Admin Password Resets
  • Malicious npm Packages Exploit Discord and Crypto Wallets
  • GlassWorm Campaign Expands via Malicious VSX Extensions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News