Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GlassWorm Malware Tied to Over 70 Open VSX Clones

GlassWorm Malware Tied to Over 70 Open VSX Clones

Posted on April 28, 2026 By CWS

GlassWorm Malware Infiltrates Open VSX Marketplace

In a recent cybersecurity revelation, over 70 extensions listed on the Open VSX marketplace have been identified as potential threats associated with the GlassWorm malware, according to a report by Socket. These extensions, which surfaced in April, pose a significant risk to users by potentially deploying malware through future updates.

GlassWorm’s Stealthy Emergence and Techniques

Initially appearing in October 2025, GlassWorm infiltrated the Open VSX registry through around twelve extensions. These extensions, downloaded numerous times, utilized Unicode variation selectors to obscure malicious code. The malware’s command-and-control infrastructure cleverly exploited the Solana blockchain, making it difficult to trace.

GlassWorm is engineered to harvest GitHub, Git, and NPM credentials, steal sensitive information, and target cryptocurrency. It expanded its reach to other open-source platforms by November and resurfaced with increased frequency in the following months, compromising over 150 repositories by March.

Impersonation and Social Engineering Tactics

Recently, Socket identified 73 suspicious extensions mimicking popular ones on the Open VSX marketplace. These clones were distributed by newly established GitHub accounts, often characterized by minimal public repositories labeled with cryptic eight-character strings. At least six of these extensions have already been activated, waiting to execute malware through subsequent updates.

The impersonation strategy adopted involves replicating legitimate listings, including icons, names, and descriptions, but under a different publisher and identifier. This method is a core component of the social engineering tactics used in the latest GlassWorm wave, aiming to build trust visually before deploying harmful software.

Complex Malware Delivery Mechanisms

The extensions employ sophisticated malware delivery methods, combining previously known techniques. Some include bundled native binaries with components from earlier GlassWorm attacks, while others fetch the malware from remote servers. This complex strategy allows the malware to elude standard detection tools by distributing critical logic across various mechanisms.

By separating malicious activities from the extension’s source code, the threat actors enhance the chance of their activities going unnoticed. The evolving nature of GlassWorm highlights the ongoing challenges in cybersecurity, particularly in managing supply chain vulnerabilities.

In the face of such threats, vigilance and proactive measures are essential to safeguard sensitive data and maintain security across software ecosystems. Further developments in this situation will be closely monitored by cybersecurity experts.

Security Week News Tags:Cybersecurity, Extensions, GitHub, GlassWorm, Malware, malware delivery, Open VSX, social engineering, Solana blockchain, supply chain attack

Post navigation

Previous Post: Zero Trust Data Movement: The Overlooked Challenge
Next Post: WhatsApp Develops Built-In Cloud Backup with Encryption

Related Posts

Chinese Cyber Threats Breach Global Telecom Systems Chinese Cyber Threats Breach Global Telecom Systems Security Week News
High-Severity Vulnerabilities Patched in VMware Aria Operations, NSX, vCenter  High-Severity Vulnerabilities Patched in VMware Aria Operations, NSX, vCenter  Security Week News
US Seizes .8 Million From Zeppelin Ransomware Operator US Seizes $2.8 Million From Zeppelin Ransomware Operator Security Week News
RSAC 2026 Day 1: Key Cybersecurity Announcements RSAC 2026 Day 1: Key Cybersecurity Announcements Security Week News
OpenAI to Help DoD With Cyber Defense Under New 0 Million Contract OpenAI to Help DoD With Cyber Defense Under New $200 Million Contract Security Week News
Over 50,000 Asus Routers Hacked in ‘Operation WrtHug’ Over 50,000 Asus Routers Hacked in ‘Operation WrtHug’ Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chinese Hacker Extradited to US for Cyberattacks
  • VECT 2.0 Ransomware Permanently Destroys Large Files
  • WhatsApp Develops Built-In Cloud Backup with Encryption
  • GlassWorm Malware Tied to Over 70 Open VSX Clones
  • Zero Trust Data Movement: The Overlooked Challenge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chinese Hacker Extradited to US for Cyberattacks
  • VECT 2.0 Ransomware Permanently Destroys Large Files
  • WhatsApp Develops Built-In Cloud Backup with Encryption
  • GlassWorm Malware Tied to Over 70 Open VSX Clones
  • Zero Trust Data Movement: The Overlooked Challenge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark