Malware & RansomwareHIGH

GlassWorm Campaign Exploits 72 Extensions to Target Developers

THThe Hacker News
GlassWormOpen VSXmalicious extensionssoftware supply chainnpm packages
🎯

Basically, hackers are using fake software tools to sneak malware into developers' systems.

Quick Summary

A new GlassWorm campaign exploits 72 malicious extensions targeting developers. This sophisticated attack uses seemingly harmless tools to deliver malware. Developers must stay vigilant to protect their systems from these threats.

What Happened

Cybersecurity researchers have unveiled a new phase in the GlassWorm campaign, marking a significant escalation in its tactics. This malware campaign now exploits the Open VSX registry, targeting developers through malicious extensions. Instead of embedding malicious code directly, attackers now use extensionPack and extensionDependencies to transform seemingly harmless extensions into vehicles for malware delivery. This clever manipulation allows them to pull in malicious extensions only after trust has been established with the initial installation.

Since January 31, 2026, at least 72 new malicious Open VSX extensions have been identified. These extensions masquerade as popular developer tools, such as linters and AI-powered coding assistants. Some of the names include angular-studio.ng-angular-extension and mswincx.antigravity-cockpit. The Open VSX team has acted swiftly to remove these threats from their registry.

Who's Affected

The primary targets of this campaign are developers who rely on the Open VSX registry? for their coding tools. By using extensions that appear legitimate, attackers can infiltrate development environments and potentially compromise sensitive data. The implications are severe, as these malicious extensions can steal secrets, drain cryptocurrency wallets, and turn infected systems into proxies for further criminal activities.

The broader developer community is at risk, especially those who may not be aware of the sophisticated tactics employed by the GlassWorm campaign?. With 151 GitHub repositories reportedly affected, the scale of this attack is alarming. Developers must remain vigilant about the tools they integrate into their workflows.

Tactics & Techniques

The GlassWorm campaign? retains several signature tactics, such as avoiding infections on systems with a Russian locale and utilizing Solana transactions for command-and-control communication. The latest extensions feature enhanced obfuscation techniques and rotate Solana wallets to evade detection. By abusing the relationships between extensions, attackers can deploy malicious payloads without raising immediate suspicion.

This method mirrors the tactics used in npm packages, where rogue dependencies can be used to bypass security checks. Attackers first upload benign extensions to the marketplace, gaining trust before later updating them to include malicious dependencies. This transitive delivery? method is a game-changer in the realm of supply chain attacks.

How to Protect Yourself

To safeguard against these threats, developers should adopt a proactive approach. Here are some recommended actions:

  • Verify Extensions: Always check the source and reviews of any extensions before installation.
  • Regular Updates: Keep development tools and extensions updated to benefit from the latest security patches.
  • Monitor Dependencies: Use tools to audit and monitor dependencies in your projects for any malicious activity.
  • Educate Teams: Conduct regular training sessions to raise awareness about supply chain attacks and safe coding practices.

By staying informed and cautious, developers can help protect themselves from the evolving tactics of the GlassWorm campaign? and similar threats.

💡 Tap dotted terms for explanations

🔒 Pro insight: The evolving tactics of GlassWorm highlight the critical need for enhanced scrutiny of third-party dependencies in software development.

Original article from

The Hacker News

Read Full Article

Related Pings

HIGHMalware & Ransomware

Payload Ransomware - Breaches Royal Bahrain Hospital Data

Payload Ransomware claims to have breached Royal Bahrain Hospital, stealing 110 GB of sensitive data. Patients and the healthcare sector are at risk as the group threatens to leak this data if the ransom isn't paid. Urgent action is needed to protect sensitive information.

Security Affairs·
HIGHMalware & Ransomware

Malware - Latest Threats and Research Insights Explained

The latest malware newsletter reveals critical threats like BoryptGrab and A0Backdoor. These sophisticated attacks target users through deceptive methods, making awareness essential. Stay informed to protect your data and systems.

Security Affairs·
HIGHMalware & Ransomware

AppsFlyer SDK Hijacked to Deploy Crypto-Stealing Malware

What Happened This week, the AppsFlyer Web SDK was hijacked in a serious supply-chain attack. Malicious code was injected into the SDK, which is widely used for marketing analytics by over 15,000 businesses globally. The compromised code was designed to intercept cryptocurrency wallet addresses entered by users on various websites. Instead of sending funds to the intended wallet, the

BleepingComputer·
HIGHMalware & Ransomware

Malicious npm Packages Steal Discord and Crypto Data

A sophisticated supply chain attack has emerged, targeting Discord and cryptocurrency wallets. Users of npm packages are at risk of having their sensitive data stolen. Immediate action is required to secure accounts and data.

Cyber Security News·
HIGHMalware & Ransomware

GlassWorm Malware Expands Reach with 72 Malicious Extensions

The GlassWorm malware campaign has escalated, infecting developer environments through 72 malicious Open VSX extensions. Developers using popular tools are at risk, as attackers employ clever tricks to bypass security measures. Immediate action is necessary to protect sensitive data and maintain secure coding practices.

Cyber Security News·
HIGHMalware & Ransomware

SmartApeSG Campaign Deploys Remcos RAT via ClickFix Page

A new campaign is using a fake ClickFix page to spread Remcos RAT. Individuals and organizations are at risk of remote access and data theft. Stay vigilant and protect your systems from this growing threat.

SANS ISC Full Text·