Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Open VSX Downplays Impact From GlassWorm Campaign

Posted on October 31, 2025October 31, 2025 By CWS

The GlassWorm marketing campaign that contaminated VS Code extensions within the Open VSX market has been absolutely contained, the Open VSX group says.

Maintained by the Eclipse Basis, the Open VSX registry is an open supply various to Microsoft’s Visible Studio Market, offering builders with a server software for the administration of VS Code extensions.

On October 18, Koi Safety warned of GlassWorm, a marketing campaign concentrating on Visible Studio builders with an data stealer, via malicious extensions distributed on Open VSX.

The extensions, estimated to have been downloaded almost 36,000 occasions, had been injected with code hidden utilizing Unicode variation selectors, in order that it could not be seen in code editors.

The malware, dubbed GlassWorm, might steal delicate data akin to credentials, drain funds from cryptocurrency wallets, deploy SOCKS proxy servers, and set up hidden VNC servers for distant entry to the contaminated methods.

Moreover, Koi warned, it was self-propagating, utilizing the stolen developer credentials to contaminate further packages and extensions.

Based on the Open VSX group, GlassWorm “was not a self-replicating worm within the conventional sense”, because it couldn’t autonomously propagate via methods. As an alternative, it stole credentials that might be used to increase the attacker’s attain.

Open VSX has eliminated all of the malicious extensions from {the marketplace} and considers the incident to have been absolutely contained on October 21. Its influence, the group says, was seemingly decrease than estimated, because the reported obtain rely additionally consists of bot downloads, meant to inflate the extensions’ visibility.Commercial. Scroll to proceed studying.

“There is no such thing as a indication of ongoing compromise or remaining malicious extensions on the platform,” the Open VSX group says.

This month, the group additionally revoked tokens that had been inadvertently uncovered by a number of extensions, and which might be used to publish or modify extensions.

“These exposures had been brought on by developer errors, not a compromise of the Open VSX infrastructure. To enhance detection going ahead, we launched a token prefix format in collaboration with MSRC to allow simpler and extra correct scanning for uncovered tokens throughout public repositories,” the group notes.

Moreover, the group applied shorter default validity intervals for tokens, improved inside processes to make token revocation sooner, and applied automated safety scanning of all extensions on the time of publication, to detect malicious code and embedded secrets and techniques from the beginning.

Associated: SBOM Pioneer Allan Friedman Joins NetRise to Advance Provide Chain Visibility

Associated: Shai-Hulud Provide Chain Assault: Worm Used to Steal Secrets and techniques, 180+ NPM Packages Hit

Associated: Over 6,700 Non-public Repositories Made Public in Nx Provide Chain Assault

Associated: AI Provide Chain Assault Methodology Demonstrated In opposition to Google, Microsoft Merchandise

Security Week News Tags:Campaign, Downplays, GlassWorm, Impact, Open, VSX

Post navigation

Previous Post: Microsoft Introduces Researcher in Microsoft 365 Copilot, a Secure Virtual Assistant for Your Computer
Next Post: Progress Patches MOVEit Transfer Uncontrolled Resource Consumption vulnerability

Related Posts

Zscaler to Acquire MDR Specialist Red Canary Security Week News
Cisco’s Quantum Bet: Linking Small Machines Into One Giant Quantum Computer Security Week News
Descope Raises $35 Million in Seed Round Extension Security Week News
Chrome Update Patches Fifth Zero-Day of 2025 Security Week News
Cerby Raises $40 Million for Identity Automation Platform Security Week News
F5 to Acquire CalypsoAI for $180 Million Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks
  • Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data
  • GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks
  • Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data
  • GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News