Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GlassWorm Campaign Expands via Malicious VSX Extensions

GlassWorm Campaign Expands via Malicious VSX Extensions

Posted on March 14, 2026 By CWS

The GlassWorm malware campaign is intensifying its impact through advanced tactics that target software developers. By leveraging transitive dependencies, this campaign infiltrates development environments more effectively than before.

Escalating Supply Chain Attacks

On March 13, 2026, the Socket Research Team uncovered at least 72 new malicious extensions in the Open VSX marketplace, linked to GlassWorm. Instead of embedding malware in initial extensions, the attackers now use secondary updates to introduce harmful payloads, once trust with the developers is established.

These malicious strategies exploit legitimate extension manifest fields, namely extensionPack and extensionDependencies, which are intended to assist developers in bundling necessary tools. Initially, benign extensions are registered, but subsequent updates secretly incorporate links to a hidden GlassWorm loader, bypassing typical initial reviews.

Techniques and Targets

The attackers enhance their reach by impersonating well-known developer tools, significantly increasing the download numbers. These malicious packages masquerade as popular linters, code formatters, and language tools for frameworks like Python, Vue, Angular, and Flutter. AI developer tools are also targeted, with fake extensions mimicking assistants like Claude Code and Codex.

In certain cases, such as the daeumer-web.es-linter-for-vs-code package, attackers utilize typosquatting, misrepresenting legitimate publisher names to deceive users. GlassWorm’s ultimate aim is the theft of sensitive information from developer systems.

Advanced Malware Tactics

Recent GlassWorm variants showcase sophisticated capabilities, including infrastructure rotation, where attackers move their Solana wallet to a new address and add new command-and-control IPs. The malware’s obfuscation techniques have evolved, incorporating RC4, base64, and string-array methods.

Additionally, decryption keys are now dynamically retrieved from attacker-controlled HTTP headers, enhancing concealment. Execution guardrails involve staged JavaScript execution, in-memory code execution, and geofencing to evade analysis.

Preventive Measures

To counter these threats, traditional security reviews of extensions at initial release are insufficient. Development teams should implement new strategies to protect against transitive infections by auditing version histories for new extensionPack or extensionDependencies links.

Comprehensive reviews of installation and update chains are necessary, along with searching for GlassWorm indicators like Solana memo lookups. It is crucial to immediately remove and block any known GlassWorm-associated packages from work environments.

Stay updated on cybersecurity developments by following us on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:Cybersecurity, developer security, extensionDependencies, extensionPack, GlassWorm, Malware, Obfuscation, software vulnerabilities, supply chain attack, VSX extensions

Post navigation

Previous Post: Global Effort Shuts Down 45,000 Malicious IPs in Cybercrime Sweep
Next Post: Malicious npm Packages Exploit Discord and Crypto Wallets

Related Posts

Record-Breaking 15 Tbps DDoS Attack From 500,000+ Devices Hits Azure Network Record-Breaking 15 Tbps DDoS Attack From 500,000+ Devices Hits Azure Network Cyber Security News
Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys Cyber Security News
Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers Cyber Security News
7-Zip Arbitrary File Write Vulnerability Let Attackers Execute Arbitrary Code 7-Zip Arbitrary File Write Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information Cyber Security News
Predator Spyware Compamy Used 15 Zero-Days Since 2021 to Target iOS Users Predator Spyware Compamy Used 15 Zero-Days Since 2021 to Target iOS Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenClaw AI Vulnerabilities Pose Security Threats
  • GlassWorm Attack Exploits Open VSX Extensions to Target Developers
  • HPE AOS-CX Flaw Allows Admin Password Resets
  • Malicious npm Packages Exploit Discord and Crypto Wallets
  • GlassWorm Campaign Expands via Malicious VSX Extensions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenClaw AI Vulnerabilities Pose Security Threats
  • GlassWorm Attack Exploits Open VSX Extensions to Target Developers
  • HPE AOS-CX Flaw Allows Admin Password Resets
  • Malicious npm Packages Exploit Discord and Crypto Wallets
  • GlassWorm Campaign Expands via Malicious VSX Extensions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News