Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GlassWorm Exploits VSX Extensions to Target Developers

GlassWorm Exploits VSX Extensions to Target Developers

Posted on February 3, 2026 By CWS

Key Points

  • GlassWorm compromises VSX extensions, impacting over 22,000 downloads.
  • Malicious updates deployed through a trusted publisher account.
  • Focus on macOS systems, targeting sensitive developer data.

GlassWorm Threatens Developer Security

A recent cybersecurity incident involving GlassWorm has raised significant concerns among developers utilizing the Open VSX Registry. Trusted VSX extensions, commonly used for development tasks, were covertly transformed into malware carriers, affecting over 22,000 downloads.

The threat actors executed their scheme by compromising a trusted publisher account. This allowed them to release updates that appeared legitimate but were, in fact, laced with a staged loader designed to deploy malware.

Impact of Compromised Extensions

The affected extensions were integral to several developer workflows, including file synchronization, internationalization, mind mapping, and CSS conversion. This breach turned routine development activities into potential security threats.

Security analysts at Socket.dev identified the attack as a supply chain compromise, likely due to unauthorized access to the oorzc publisher account. Developers who unknowingly installed these malicious updates risked deploying the GlassWorm loader without any visible alerts.

Despite the Open VSX security team’s swift action to remove the malicious extensions and revoke tokens, the incident’s exposure duration has sparked serious concerns about the potential misuse of stolen credentials.

Advanced Techniques and MacOS Focus

GlassWorm’s latest campaign demonstrates an escalation in its attack strategies. Instead of relying on counterfeit projects, the malware was embedded in legitimate, long-standing extensions, enhancing its concealment.

While GlassWorm’s operations span multiple platforms, its primary focus remains on macOS systems. The malware is designed to steal browser data, cryptocurrency wallets, SSH keys, AWS credentials, and other sensitive developer information.

This evolution from simple theft to supply chain infiltration indicates that a single compromised device can quickly escalate to cloud environments and CI pipelines.

Conclusion

The GlassWorm incident underscores the critical need for robust security measures in developer environments. As attackers refine their techniques, safeguarding supply chains and monitoring extension updates become paramount to prevent similar breaches in the future.

Cyber Security News Tags:Cybersecurity, developer security, GlassWorm, Malware, Open VSX, supply chain attack, VSX extensions

Post navigation

Previous Post: Advanced PDFly Malware Variant Utilizes Custom Encryption
Next Post: Growing Infostealer Threat Targets macOS Using Python

Related Posts

BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized Cyber Security News
PureHVNC RAT Developers Leverage GitHub Host Source Code PureHVNC RAT Developers Leverage GitHub Host Source Code Cyber Security News
Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched Cyber Security News
Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers Cyber Security News
Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks Cyber Security News
Hackers Weaponized Linux Webcams as Attack Tools to Inject Keystrokes and Launch Attacks Hackers Weaponized Linux Webcams as Attack Tools to Inject Keystrokes and Launch Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News