Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GlassWorm Malware Tied to Over 70 Open VSX Clones

GlassWorm Malware Tied to Over 70 Open VSX Clones

Posted on April 28, 2026 By CWS

GlassWorm Malware Infiltrates Open VSX Marketplace

In a recent cybersecurity revelation, over 70 extensions listed on the Open VSX marketplace have been identified as potential threats associated with the GlassWorm malware, according to a report by Socket. These extensions, which surfaced in April, pose a significant risk to users by potentially deploying malware through future updates.

GlassWorm’s Stealthy Emergence and Techniques

Initially appearing in October 2025, GlassWorm infiltrated the Open VSX registry through around twelve extensions. These extensions, downloaded numerous times, utilized Unicode variation selectors to obscure malicious code. The malware’s command-and-control infrastructure cleverly exploited the Solana blockchain, making it difficult to trace.

GlassWorm is engineered to harvest GitHub, Git, and NPM credentials, steal sensitive information, and target cryptocurrency. It expanded its reach to other open-source platforms by November and resurfaced with increased frequency in the following months, compromising over 150 repositories by March.

Impersonation and Social Engineering Tactics

Recently, Socket identified 73 suspicious extensions mimicking popular ones on the Open VSX marketplace. These clones were distributed by newly established GitHub accounts, often characterized by minimal public repositories labeled with cryptic eight-character strings. At least six of these extensions have already been activated, waiting to execute malware through subsequent updates.

The impersonation strategy adopted involves replicating legitimate listings, including icons, names, and descriptions, but under a different publisher and identifier. This method is a core component of the social engineering tactics used in the latest GlassWorm wave, aiming to build trust visually before deploying harmful software.

Complex Malware Delivery Mechanisms

The extensions employ sophisticated malware delivery methods, combining previously known techniques. Some include bundled native binaries with components from earlier GlassWorm attacks, while others fetch the malware from remote servers. This complex strategy allows the malware to elude standard detection tools by distributing critical logic across various mechanisms.

By separating malicious activities from the extension’s source code, the threat actors enhance the chance of their activities going unnoticed. The evolving nature of GlassWorm highlights the ongoing challenges in cybersecurity, particularly in managing supply chain vulnerabilities.

In the face of such threats, vigilance and proactive measures are essential to safeguard sensitive data and maintain security across software ecosystems. Further developments in this situation will be closely monitored by cybersecurity experts.

Security Week News Tags:Cybersecurity, Extensions, GitHub, GlassWorm, Malware, malware delivery, Open VSX, social engineering, Solana blockchain, supply chain attack

Post navigation

Previous Post: Zero Trust Data Movement: The Overlooked Challenge
Next Post: WhatsApp Develops Built-In Cloud Backup with Encryption

Related Posts

ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact Security Week News
Valuable Information Leaked in LockBit Ransomware Hack  Valuable Information Leaked in LockBit Ransomware Hack  Security Week News
March 2026 Cybersecurity M&A: Key Deals and Insights March 2026 Cybersecurity M&A: Key Deals and Insights Security Week News
Gravwell Closes .4M Funding Round to Expand Data Analytics and Security Platform Gravwell Closes $15.4M Funding Round to Expand Data Analytics and Security Platform Security Week News
Data Breach Affects 250,000 at Nacogdoches Hospital Data Breach Affects 250,000 at Nacogdoches Hospital Security Week News
Why Sincerity Is a Strategic Asset in Cybersecurity Why Sincerity Is a Strategic Asset in Cybersecurity Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Webinar on AI Governance: Ensuring Safe Adoption
  • Windows Vulnerability Exploited by Russian Group
  • Chinese Hacker Extradited to US for Cyberattacks
  • VECT 2.0 Ransomware Permanently Destroys Large Files
  • WhatsApp Develops Built-In Cloud Backup with Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Webinar on AI Governance: Ensuring Safe Adoption
  • Windows Vulnerability Exploited by Russian Group
  • Chinese Hacker Extradited to US for Cyberattacks
  • VECT 2.0 Ransomware Permanently Destroys Large Files
  • WhatsApp Develops Built-In Cloud Backup with Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark