Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Open VSX Downplays Impact From GlassWorm Campaign

Posted on October 31, 2025October 31, 2025 By CWS

The GlassWorm marketing campaign that contaminated VS Code extensions within the Open VSX market has been absolutely contained, the Open VSX group says.

Maintained by the Eclipse Basis, the Open VSX registry is an open supply various to Microsoft’s Visible Studio Market, offering builders with a server software for the administration of VS Code extensions.

On October 18, Koi Safety warned of GlassWorm, a marketing campaign concentrating on Visible Studio builders with an data stealer, via malicious extensions distributed on Open VSX.

The extensions, estimated to have been downloaded almost 36,000 occasions, had been injected with code hidden utilizing Unicode variation selectors, in order that it could not be seen in code editors.

The malware, dubbed GlassWorm, might steal delicate data akin to credentials, drain funds from cryptocurrency wallets, deploy SOCKS proxy servers, and set up hidden VNC servers for distant entry to the contaminated methods.

Moreover, Koi warned, it was self-propagating, utilizing the stolen developer credentials to contaminate further packages and extensions.

Based on the Open VSX group, GlassWorm “was not a self-replicating worm within the conventional sense”, because it couldn’t autonomously propagate via methods. As an alternative, it stole credentials that might be used to increase the attacker’s attain.

Open VSX has eliminated all of the malicious extensions from {the marketplace} and considers the incident to have been absolutely contained on October 21. Its influence, the group says, was seemingly decrease than estimated, because the reported obtain rely additionally consists of bot downloads, meant to inflate the extensions’ visibility.Commercial. Scroll to proceed studying.

“There is no such thing as a indication of ongoing compromise or remaining malicious extensions on the platform,” the Open VSX group says.

This month, the group additionally revoked tokens that had been inadvertently uncovered by a number of extensions, and which might be used to publish or modify extensions.

“These exposures had been brought on by developer errors, not a compromise of the Open VSX infrastructure. To enhance detection going ahead, we launched a token prefix format in collaboration with MSRC to allow simpler and extra correct scanning for uncovered tokens throughout public repositories,” the group notes.

Moreover, the group applied shorter default validity intervals for tokens, improved inside processes to make token revocation sooner, and applied automated safety scanning of all extensions on the time of publication, to detect malicious code and embedded secrets and techniques from the beginning.

Associated: SBOM Pioneer Allan Friedman Joins NetRise to Advance Provide Chain Visibility

Associated: Shai-Hulud Provide Chain Assault: Worm Used to Steal Secrets and techniques, 180+ NPM Packages Hit

Associated: Over 6,700 Non-public Repositories Made Public in Nx Provide Chain Assault

Associated: AI Provide Chain Assault Methodology Demonstrated In opposition to Google, Microsoft Merchandise

Security Week News Tags:Campaign, Downplays, GlassWorm, Impact, Open, VSX

Post navigation

Previous Post: Microsoft Introduces Researcher in Microsoft 365 Copilot, a Secure Virtual Assistant for Your Computer
Next Post: Progress Patches MOVEit Transfer Uncontrolled Resource Consumption vulnerability

Related Posts

Critical OpenPGP.js Vulnerability Allows Spoofing Security Week News
Surveillance Firm Bypasses SS7 Protections to Retrieve User Location Security Week News
Echo Raises $35 Million in Series A Funding Security Week News
Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape Security Week News
Ingram Micro Restores Systems Impacted by Ransomware Security Week News
Organizations Warned of Vulnerability in Microsoft Exchange Hybrid Deployment Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data
  • CISO Communities – Cybersecurity’s Secret Weapon
  • Fortinet FortiWeb Vulnerability (CVE-2025-64446) Exploited in the Wild for Full Admin Takeover
  • 700,000 Records Compromised in Askul Ransomware Attack
  • Echo Raises $35 Million in Series A Funding

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data
  • CISO Communities – Cybersecurity’s Secret Weapon
  • Fortinet FortiWeb Vulnerability (CVE-2025-64446) Exploited in the Wild for Full Admin Takeover
  • 700,000 Records Compromised in Askul Ransomware Attack
  • Echo Raises $35 Million in Series A Funding

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark