Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack

Posted on February 2, 2026February 2, 2026 By CWS

The GlassWorm malware has appeared on the Open VSX market once more, after a writer’s account was compromised in a provide chain assault, Socket stories.

On January 30, a risk actor revealed malicious variations of 4 established VS Code extensions with over 22,000 mixed downloads.

The extensions contained code that may execute at runtime, evade methods with Russian locales, resolve command-and-control (C&C) knowledge from Solana transaction memos, and run further code.

Per beforehand noticed exercise, the extensions had been repurposed to deploy a GlassWorm loader, however the contemporary assault didn’t depend on typosquatting or cloned instruments.

“Against this, these 4 extensions had been revealed below a longtime writer account with a multi-extension historical past and significant adoption indicators throughout ecosystems,” Socket notes.

The writer additionally maintains Visible Studio Market listings with hundreds of downloads, however the analyzed incident solely issues Open VSX extensions.Commercial. Scroll to proceed studying.

“The risk actor revealed poisoned updates via a longtime writer identification, and the Open VSX safety group assessed the incident as according to leaked tokens or different unauthorized publishing entry,” Socket notes.

macOS malware

The risk actor hid an almost similar loader within the extension.js file of every extension. It hundreds code that profiles the system and receives directions from a transaction memo on Solana.

The loader explicitly focuses on macOS methods, transferring to the following stage provided that OS checks are handed. The second payload is a Node.js JavaScript implant designed for knowledge theft and persistence.

As soon as executed, the malware targets Firefox- and Chrome-based browsers to steal cookies, type historical past, login information, and wallet-extension artifacts. It additionally searches the system for Safari cookies, desktop cryptocurrency wallets, and macOS keychain, Apple Notes, and FortiClient VPN knowledge.

Lastly, it collects paperwork from the Desktop, Paperwork, and Downloads folders, and levels all of the harvested data for exfiltration to hardcoded exterior locations.

In keeping with Socket, the malware particularly targets developer credentials and configuration, reminiscent of AWS and SSH data, growing the danger of account compromise and lateral motion actions.

“This marketing campaign reveals a transparent escalation in Open VSX provide chain abuse. The risk actor blends into regular developer workflows, hides execution behind encrypted, runtime-decrypted loaders, and makes use of Solana memos as a dynamic lifeless drop to rotate staging infrastructure with out republishing extensions,” Socket notes.

Associated: Notepad++ Provide Chain Hack Performed by China by way of Internet hosting Supplier

Associated: eScan Antivirus Delivers Malware in Provide Chain Assault

Associated: ‘PackageGate’ Flaws Open JavaScript Ecosystem to Provide Chain Assaults

Associated: Shai-Hulud Provide Chain Assault Led to $8.5 Million Belief Pockets Heist

Security Week News Tags:Account, Attack, Fresh, GlassWorm, Hijacked, Open, Publisher, VSX

Post navigation

Previous Post: Hackers Exploiting Microsoft Office 0-day Vulnerability to Deploy Malware
Next Post: Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details

Related Posts

China Accuses US of Cyberattack on National Time Center Security Week News
Nikkei Says 17,000 Impacted by Data Breach Stemming From Slack Account Hack Security Week News
Microsoft Boosts .NET Bounty Program Rewards to $40,000 Security Week News
Veeam to Acquire Data Security Firm Securiti AI for $1.7 Billion Security Week News
Prime Security Raises $20 Million to Build Agentic Security Architect Security Week News
Police in Brazil Arrest a Suspect Over $100M Banking Hack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ShinyHunters-Branded Extortion Activity Expands, Escalates
  • New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency
  • 21,000+ OpenClaw AI Instances With Personal Configurations Exposed Online

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ShinyHunters-Branded Extortion Activity Expands, Escalates
  • New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency
  • 21,000+ OpenClaw AI Instances With Personal Configurations Exposed Online

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark