Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery

Posted on October 31, 2025October 31, 2025 By CWS

Oct 31, 2025Ravie LakshmananMalware / Safe Coding
Eclipse Basis, which maintains the open-source Open VSX challenge, stated it has taken steps to revoke a small variety of tokens that had been leaked inside Visible Studio Code (VS Code) extensions printed within the market.
The motion comes following a report from cloud safety firm Wiz earlier this month, which discovered a number of extensions from each Microsoft’s VS Code Market and Open VSX to have inadvertently uncovered their entry tokens inside public repositories, probably permitting unhealthy actors to grab management and distribute malware, successfully poisoning the extension provide chain.
“Upon investigation, we confirmed {that a} small variety of tokens had been leaked and will probably be abused to publish or modify extensions,” Mikaël Barbero, head of safety on the Eclipse Basis, stated in a press release. “These exposures had been brought on by developer errors, not a compromise of the Open VSX infrastructure.”
Open VSX stated it has additionally launched a token prefix format “ovsxp_” in collaboration with the Microsoft Safety Response Middle (MSRC) to make it simpler to scan for uncovered tokens throughout public repositories.

Moreover, the registry maintainers stated they’ve recognized and eliminated all extensions that had been just lately flagged by Koi Safety as a part of a marketing campaign named “GlassWorm,” whereas emphasizing that the malware distributed by means of the exercise was not a “self-replicating worm” in that it first must steal developer credentials with a purpose to prolong its attain.
“We additionally consider that the reported obtain depend of 35,800 overstates the precise variety of affected customers, because it contains inflated downloads generated by bots and visibility-boosting techniques utilized by the risk actors,” Barbero added.
Open VSX stated it is also within the technique of imposing plenty of safety modifications to bolster the provision chain, together with –

Lowering the token lifetime limits by default to scale back the influence of unintentional leaks
Making token revocation simpler upon notification
Automated scanning of extensions on the time of publication to test for malicious code patterns or embedded secrets and techniques

The brand new measures to strengthen the ecosystem’s cyber resilience come because the software program provider ecosystem and builders are more and more turning into the goal of assaults, permitting attackers far-reaching, persistent entry to enterprise environments.
“Incidents like this remind us that offer chain safety is a shared accountability: from publishers managing their tokens rigorously, to registry maintainers bettering detection and response capabilities,” Barbero stated.

The Hacker News Tags:Discovery, Eclipse, Foundation, Leaked, Open, Revokes, Tokens, VSX, Wiz

Post navigation

Previous Post: AzureHound Penetration Testing Tool Exploited by Threat Actors to Enumerate Azure and Entra ID
Next Post: Threat Actors Using Multilingual ZIP File to Attack Financial and Goverment Organizations

Related Posts

Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials The Hacker News
UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns The Hacker News
Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App The Hacker News
New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions The Hacker News
Why CISOs Must Rethink Incident Remediation The Hacker News
New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News