GlassWorm malware targets OpenVSX, VS Code registries
Summary
Hide ▲
Show ▼
The GlassWorm malware campaign has resurfaced with a significant escalation, adding at least 72 new malicious Open VSX extensions since January 31, 2026. The malware uses invisible Unicode characters to hide malicious code and targets GitHub, NPM, and OpenVSX account credentials, as well as cryptocurrency wallet data. The campaign initially impacted 49 extensions, with an estimated 35,800 downloads, though this figure includes inflated numbers due to bots and visibility-boosting tactics. The Eclipse Foundation has revoked leaked tokens and introduced security measures, but the threat actors have pivoted to GitHub and now returned to OpenVSX with updated command-and-control endpoints. The malware's global reach includes systems in the United States, South America, Europe, Asia, and a government entity in the Middle East. Koi Security has accessed the attackers' server and shared victim data with law enforcement. The threat actors have posted a fresh transaction to the Solana blockchain, providing an updated C2 endpoint for downloading the next-stage payload. The attacker's server was inadvertently exposed, revealing a partial list of victims spanning the U.S., South America, Europe, and Asia, including a major government entity from the Middle East. The threat actor is assessed to be Russian-speaking and uses the open-source browser extension C2 framework named RedExt as part of their infrastructure. The third wave of GlassWorm uses Rust-based implants packaged inside the extensions and targets popular tools and developer frameworks like Flutter, Vim, Yaml, Tailwind, Svelte, React Native, and Vue. Additionally, a malicious Rust package named "evm-units" was discovered, targeting Windows, macOS, and Linux systems. This package, uploaded to crates.io in mid-April 2025, attracted over 7,000 downloads and was designed to stealthily execute on developer machines by masquerading as an Ethereum Virtual Machine (EVM) unit helper tool. The package checks for the presence of Qihoo 360 antivirus and alters its execution flow accordingly. The references to EVM and Uniswap indicate that the supply chain incident is designed to target developers in the Web3 space. The latest development involves the compromise of a legitimate developer's resources to push malicious updates to downstream users, with the malicious extensions having previously been presented as legitimate developer utilities and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases. A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems. The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times. GlassWorm attacks first appeared in late October, hiding the malicious code using "invisible" Unicode characters to steal cryptocurrency wallet and developer account details. The malware also supports VNC-based remote access and SOCKS proxying. Over time and across multiple attack waves, GlassWorm impacted both Microsoft's official Visual Studio Code marketplace and its open-source alternative for unsupported IDEs, OpenVSX. In a previous campaign, GlassWorm showed signs of evolution, targeting macOS systems, and its developers were working to add a replacement mechanism for the Trezor and Ledger apps. A new report from Socket's security team describes a new campaign that relied on trojanizing the following extensions: oorzc.ssh-tools v0.5.1, oorzc.i18n-tools-plus v1.6.8, oorzc.mind-map v1.0.61, oorzc.scss-to-css-compile v1.3.4. The malicious updates were pushed on January 30, and Socket reports that the extensions had been innocuous for two years. This suggests that the oorzc account was most likely compromised by GlassWorm operators. According to the researchers, the campaign targets macOS systems exclusively, pulling instructions from Solana transaction memos. Notably, Russian-locale systems are excluded, which may hint at the origin of the attacker. GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login. It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251. Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases. The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases. Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords. The GlassWorm campaign now abuses extensionPack and extensionDependencies to turn initially standalone-looking extensions into transitive delivery vehicles in later updates. The new extensions mimic widely used developer utilities and feature heavier obfuscation and Solana wallet rotation to evade detection. The campaign also affects 151 GitHub repositories and two npm packages using the same Unicode technique. Additionally, 88 new malicious npm packages were uploaded in three waves between November 2025 and February 2026, using Remote Dynamic Dependencies (RDD) to modify malicious code on the fly. The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of Python repositories. The attack targets Python projects including Django apps, ML research code, Streamlit dashboards, and PyPI packages by appending obfuscated code to files like setup.py, main.py, and app.py. The earliest injections date back to March 8, 2026. The attackers, upon gaining access to the developer accounts, rebase the latest legitimate commits on the default branch of the targeted repositories with malicious code, and then force-push the changes, while keeping the original commit's message, author, and author date intact. This new offshoot of the GlassWorm campaign has been codenamed ForceMemo. The Base64-encoded payload, appended to the end of the Python file, features GlassWorm-like checks to determine if the system has its locale set to Russian. If so, it skips execution. In all other cases, the malware queries the transaction memo field associated with a Solana wallet ("BjVeAjPrSKFiingBn4vZvghsGj9KCE8AJVtbc9S8o8SC") previously linked to GlassWorm to extract the payload URL. The earliest transaction on the C2 address dates to November 27, 2025 -- over three months before the first GitHub repo injections on March 8, 2026. The address has 50 transactions total, with the attacker regularly updating the payload URL, sometimes multiple times per day. The disclosure comes as Socket flagged a new iteration of the GlassWorm that technically retains the same core tradecraft while improving survivability and evasion by leveraging extensionPack and extensionDependencies to deliver the malicious payload by means of a transitive distribution model. Aikido Security also attributed the GlassWorm author to a mass campaign that compromised more than 151 GitHub repositories with malicious code concealed using invisible Unicode characters. The decoded payload is configured to fetch the C2 instructions from the same Solana wallet, indicating that the threat actor has been targeting GitHub repositories in multiple waves. The use of different delivery methods and code obfuscation methods, but the same Solana infrastructure, suggests ForceMemo is a new delivery vector maintained and operated by the GlassWorm threat actor, who has now expanded from compromising VS Code extensions to a broader GitHub account takeover. The attacker injects malware by force-pushing to the default branch of compromised repositories. This technique rewrites git history, preserves the original commit message and author, and leaves no pull request or commit trail in GitHub's UI. No other documented supply chain campaign uses this injection method.
Timeline
-
16.03.2026 21:37 1 articles · 23h ago
GlassWorm malware campaign targets Python repositories using stolen GitHub tokens
The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of Python repositories. The attack targets Python projects including Django apps, ML research code, Streamlit dashboards, and PyPI packages by appending obfuscated code to files like setup.py, main.py, and app.py. The earliest injections date back to March 8, 2026. The attackers, upon gaining access to the developer accounts, rebase the latest legitimate commits on the default branch of the targeted repositories with malicious code, and then force-push the changes, while keeping the original commit's message, author, and author date intact. This new offshoot of the GlassWorm campaign has been codenamed ForceMemo. The Base64-encoded payload, appended to the end of the Python file, features GlassWorm-like checks to determine if the system has its locale set to Russian. If so, it skips execution. In all other cases, the malware queries the transaction memo field associated with a Solana wallet ("BjVeAjPrSKFiingBn4vZvghsGj9KCE8AJVtbc9S8o8SC") previously linked to GlassWorm to extract the payload URL. The earliest transaction on the C2 address dates to November 27, 2025 -- over three months before the first GitHub repo injections on March 8, 2026. The address has 50 transactions total, with the attacker regularly updating the payload URL, sometimes multiple times per day. The disclosure comes as Socket flagged a new iteration of the GlassWorm that technically retains the same core tradecraft while improving survivability and evasion by leveraging extensionPack and extensionDependencies to deliver the malicious payload by means of a transitive distribution model. Aikido Security also attributed the GlassWorm author to a mass campaign that compromised more than 151 GitHub repositories with malicious code concealed using invisible Unicode characters. The decoded payload is configured to fetch the C2 instructions from the same Solana wallet, indicating that the threat actor has been targeting GitHub repositories in multiple waves. The use of different delivery methods and code obfuscation methods, but the same Solana infrastructure, suggests ForceMemo is a new delivery vector maintained and operated by the GlassWorm threat actor, who has now expanded from compromising VS Code extensions to a broader GitHub account takeover. The attacker injects malware by force-pushing to the default branch of compromised repositories. This technique rewrites git history, preserves the original commit message and author, and leaves no pull request or commit trail in GitHub's UI. No other documented supply chain campaign uses this injection method.
Show sources
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
08.11.2025 18:17 7 articles · 4mo ago
GlassWorm operators identified as Russian-speaking using RedExt C2 framework
GlassWorm operators are Russian-speaking and use the RedExt open-source C2 browser extension framework. The malware has impacted systems globally, including the United States, South America, Europe, Asia, and a government entity in the Middle East. Koi Security accessed the attackers' server and obtained key data on victims, including user IDs for multiple cryptocurrency exchanges and messaging platforms. The threat actors have posted a fresh transaction to the Solana blockchain, providing an updated C2 endpoint for downloading the next-stage payload. The attacker's server was inadvertently exposed, revealing a partial list of victims spanning the U.S., South America, Europe, and Asia, including a major government entity from the Middle East. The Glassworm campaign is now in its third wave, with 24 new packages added on OpenVSX and Microsoft Visual Studio Marketplace. The malware now uses Rust-based implants and continues to employ invisible Unicode characters to hide malicious code. The packages target popular developer tools and frameworks, and the campaign uses artificially inflated download counts to manipulate search results. The third wave includes specific packages on both marketplaces, indicating a broad targeting scope. The new iteration of GlassWorm uses Rust-based implants packaged inside the extensions, targeting Windows and macOS systems. The implants fetch C2 server details from a Solana blockchain wallet address and use Google Calendar as a backup for C2 address retrieval. Additionally, a malicious Rust package named "evm-units" was discovered, targeting Windows, macOS, and Linux systems. This package, uploaded to crates.io in mid-April 2025, attracted over 7,000 downloads and was designed to stealthily execute on developer machines by masquerading as an Ethereum Virtual Machine (EVM) unit helper tool. The package checks for the presence of Qihoo 360 antivirus and alters its execution flow accordingly. The references to EVM and Uniswap indicate that the supply chain incident is designed to target developers in the Web3 space. The latest development involves the compromise of a legitimate developer's resources to push malicious updates to downstream users, with the malicious extensions having previously been presented as legitimate developer utilities and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases. A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems. The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times. GlassWorm attacks first appeared in late October, hiding the malicious code using "invisible" Unicode characters to steal cryptocurrency wallet and developer account details. The malware also supports VNC-based remote access and SOCKS proxying. Over time and across multiple attack waves, GlassWorm impacted both Microsoft's official Visual Studio Code marketplace and its open-source alternative for unsupported IDEs, OpenVSX. In a previous campaign, GlassWorm showed signs of evolution, targeting macOS systems, and its developers were working to add a replacement mechanism for the Trezor and Ledger apps. A new report from Socket's security team describes a new campaign that relied on trojanizing the following extensions: oorzc.ssh-tools v0.5.1, oorzc.i18n-tools-plus v1.6.8, oorzc.mind-map v1.0.61, oorzc.scss-to-css-compile v1.3.4. The malicious updates were pushed on January 30, and Socket reports that the extensions had been innocuous for two years. This suggests that the oorzc account was most likely compromised by GlassWorm operators. According to the researchers, the campaign targets macOS systems exclusively, pulling instructions from Solana transaction memos. Notably, Russian-locale systems are excluded, which may hint at the origin of the attacker. GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login. It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251. Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases. The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases. Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords. The GlassWorm campaign now abuses extensionPack and extensionDependencies to turn initially standalone-looking extensions into transitive delivery vehicles in later updates. The new extensions mimic widely used developer utilities and feature heavier obfuscation and Solana wallet rotation to evade detection. The campaign also affects 151 GitHub repositories and two npm packages using the same Unicode technique. Additionally, 88 new malicious npm packages were uploaded in three waves between November 2025 and February 2026, using Remote Dynamic Dependencies (RDD) to modify malicious code on the fly. The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of Python repositories. The attack targets Python projects including Django apps, ML research code, Streamlit dashboards, and PyPI packages by appending obfuscated code to files like setup.py, main.py, and app.py. The earliest injections date back to March 8, 2026. The attackers, upon gaining access to the developer accounts, rebase the latest legitimate commits on the default branch of the targeted repositories with malicious code, and then force-push the changes, while keeping the original commit's message, author, and author date intact. This new offshoot of the GlassWorm campaign has been codenamed ForceMemo. The Base64-encoded payload, appended to the end of the Python file, features GlassWorm-like checks to determine if the system has its locale set to Russian. If so, it skips execution. In all other cases, the malware queries the transaction memo field associated with a Solana wallet ("BjVeAjPrSKFiingBn4vZvghsGj9KCE8AJVtbc9S8o8SC") previously linked to GlassWorm to extract the payload URL. The earliest transaction on the C2 address dates to November 27, 2025 -- over three months before the first GitHub repo injections on March 8, 2026. The address has 50 transactions total, with the attacker regularly updating the payload URL, sometimes multiple times per day. The disclosure comes as Socket flagged a new iteration of the GlassWorm that technically retains the same core tradecraft while improving survivability and evasion by leveraging extensionPack and extensionDependencies to deliver the malicious payload by means of a transitive distribution model. Aikido Security also attributed the GlassWorm author to a mass campaign that compromised more than 151 GitHub repositories with malicious code concealed using invisible Unicode characters. The decoded payload is configured to fetch the C2 instructions from the same Solana wallet, indicating that the threat actor has been targeting GitHub repositories in multiple waves. The use of different delivery methods and code obfuscation methods, but the same Solana infrastructure, suggests ForceMemo is a new delivery vector maintained and operated by the GlassWorm threat actor, who has now expanded from compromising VS Code extensions to a broader GitHub account takeover. The attacker injects malware by force-pushing to the default branch of compromised repositories. This technique rewrites git history, preserves the original commit message and author, and leaves no pull request or commit trail in GitHub's UI. No other documented supply chain campaign uses this injection method.
Show sources
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
02.11.2025 17:09 5 articles · 4mo ago
GlassWorm threat actors pivot to GitHub using Unicode steganography
The threat actors behind GlassWorm have moved to GitHub, using the same Unicode steganography trick to hide their malicious payload in multiple repositories, primarily focused on JavaScript projects. GlassWorm has returned with three new VSCode extensions on OpenVSX, downloaded over 10,000 times. The new extensions are ai-driven-dev.ai-driven-dev (3,400 downloads), adhamu.history-in-sublime-merge (4,000 downloads), and yasuyuky.transient-emacs (2,400 downloads). The latest development involves the compromise of a legitimate developer's resources to push malicious updates to downstream users, with the malicious extensions having previously been presented as legitimate developer utilities and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases. A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems. The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times. GlassWorm attacks first appeared in late October, hiding the malicious code using "invisible" Unicode characters to steal cryptocurrency wallet and developer account details. The malware also supports VNC-based remote access and SOCKS proxying. Over time and across multiple attack waves, GlassWorm impacted both Microsoft's official Visual Studio Code marketplace and its open-source alternative for unsupported IDEs, OpenVSX. In a previous campaign, GlassWorm showed signs of evolution, targeting macOS systems, and its developers were working to add a replacement mechanism for the Trezor and Ledger apps. A new report from Socket's security team describes a new campaign that relied on trojanizing the following extensions: oorzc.ssh-tools v0.5.1, oorzc.i18n-tools-plus v1.6.8, oorzc.mind-map v1.0.61, oorzc.scss-to-css-compile v1.3.4. The malicious updates were pushed on January 30, and Socket reports that the extensions had been innocuous for two years. This suggests that the oorzc account was most likely compromised by GlassWorm operators. According to the researchers, the campaign targets macOS systems exclusively, pulling instructions from Solana transaction memos. Notably, Russian-locale systems are excluded, which may hint at the origin of the attacker. GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login. It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251. Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases. The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases. Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords. The GlassWorm campaign now abuses extensionPack and extensionDependencies to turn initially standalone-looking extensions into transitive delivery vehicles in later updates. The new extensions mimic widely used developer utilities and feature heavier obfuscation and Solana wallet rotation to evade detection. The campaign also affects 151 GitHub repositories and two npm packages using the same Unicode technique. Additionally, 88 new malicious npm packages were uploaded in three waves between November 2025 and February 2026, using Remote Dynamic Dependencies (RDD) to modify malicious code on the fly. The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of Python repositories. The attack targets Python projects including Django apps, ML research code, Streamlit dashboards, and PyPI packages by appending obfuscated code to files like setup.py, main.py, and app.py. The earliest injections date back to March 8, 2026. The attackers, upon gaining access to the developer accounts, rebase the latest legitimate commits on the default branch of the targeted repositories with malicious code, and then force-push the changes, while keeping the original commit's message, author, and author date intact. This new offshoot of the GlassWorm campaign has been codenamed ForceMemo. The Base64-encoded payload, appended to the end of the Python file, features GlassWorm-like checks to determine if the system has its locale set to Russian. If so, it skips execution. In all other cases, the malware queries the transaction memo field associated with a Solana wallet ("BjVeAjPrSKFiingBn4vZvghsGj9KCE8AJVtbc9S8o8SC") previously linked to GlassWorm to extract the payload URL. The earliest transaction on the C2 address dates to November 27, 2025 -- over three months before the first GitHub repo injections on March 8, 2026. The address has 50 transactions total, with the attacker regularly updating the payload URL, sometimes multiple times per day. The disclosure comes as Socket flagged a new iteration of the GlassWorm that technically retains the same core tradecraft while improving survivability and evasion by leveraging extensionPack and extensionDependencies to deliver the malicious payload by means of a transitive distribution model. Aikido Security also attributed the GlassWorm author to a mass campaign that compromised more than 151 GitHub repositories with malicious code concealed using invisible Unicode characters. The decoded payload is configured to fetch the C2 instructions from the same Solana wallet, indicating that the threat actor has been targeting GitHub repositories in multiple waves. The use of different delivery methods and code obfuscation methods, but the same Solana infrastructure, suggests ForceMemo is a new delivery vector maintained and operated by the GlassWorm threat actor, who has now expanded from compromising VS Code extensions to a broader GitHub account takeover. The attacker injects malware by force-pushing to the default branch of compromised repositories. This technique rewrites git history, preserves the original commit message and author, and leaves no pull request or commit trail in GitHub's UI. No other documented supply chain campaign uses this injection method.
Show sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
31.10.2025 10:02 6 articles · 4mo ago
Eclipse Foundation revokes leaked tokens and introduces security measures
Open VSX has implemented additional security measures, including shortening token lifetimes, faster revocation workflows, automated security scans, and threat intelligence sharing. The threat actors behind GlassWorm have moved to GitHub, using the same Unicode steganography trick to hide their malicious payload in multiple repositories, primarily focused on JavaScript projects. The latest development involves the compromise of a legitimate developer's resources to push malicious updates to downstream users, with the malicious extensions having previously been presented as legitimate developer utilities and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases. A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems. The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times. GlassWorm attacks first appeared in late October, hiding the malicious code using "invisible" Unicode characters to steal cryptocurrency wallet and developer account details. The malware also supports VNC-based remote access and SOCKS proxying. Over time and across multiple attack waves, GlassWorm impacted both Microsoft's official Visual Studio Code marketplace and its open-source alternative for unsupported IDEs, OpenVSX. In a previous campaign, GlassWorm showed signs of evolution, targeting macOS systems, and its developers were working to add a replacement mechanism for the Trezor and Ledger apps. A new report from Socket's security team describes a new campaign that relied on trojanizing the following extensions: oorzc.ssh-tools v0.5.1, oorzc.i18n-tools-plus v1.6.8, oorzc.mind-map v1.0.61, oorzc.scss-to-css-compile v1.3.4. The malicious updates were pushed on January 30, and Socket reports that the extensions had been innocuous for two years. This suggests that the oorzc account was most likely compromised by GlassWorm operators. According to the researchers, the campaign targets macOS systems exclusively, pulling instructions from Solana transaction memos. Notably, Russian-locale systems are excluded, which may hint at the origin of the attacker. GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login. It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251. Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases. The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases. Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords. The GlassWorm campaign now abuses extensionPack and extensionDependencies to turn initially standalone-looking extensions into transitive delivery vehicles in later updates. The new extensions mimic widely used developer utilities and feature heavier obfuscation and Solana wallet rotation to evade detection. The campaign also affects 151 GitHub repositories and two npm packages using the same Unicode technique. Additionally, 88 new malicious npm packages were uploaded in three waves between November 2025 and February 2026, using Remote Dynamic Dependencies (RDD) to modify malicious code on the fly. The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of Python repositories. The attack targets Python projects including Django apps, ML research code, Streamlit dashboards, and PyPI packages by appending obfuscated code to files like setup.py, main.py, and app.py. The earliest injections date back to March 8, 2026. The attackers, upon gaining access to the developer accounts, rebase the latest legitimate commits on the default branch of the targeted repositories with malicious code, and then force-push the changes, while keeping the original commit's message, author, and author date intact. This new offshoot of the GlassWorm campaign has been codenamed ForceMemo. The Base64-encoded payload, appended to the end of the Python file, features GlassWorm-like checks to determine if the system has its locale set to Russian. If so, it skips execution. In all other cases, the malware queries the transaction memo field associated with a Solana wallet ("BjVeAjPrSKFiingBn4vZvghsGj9KCE8AJVtbc9S8o8SC") previously linked to GlassWorm to extract the payload URL. The earliest transaction on the C2 address dates to November 27, 2025 -- over three months before the first GitHub repo injections on March 8, 2026. The address has 50 transactions total, with the attacker regularly updating the payload URL, sometimes multiple times per day. The disclosure comes as Socket flagged a new iteration of the GlassWorm that technically retains the same core tradecraft while improving survivability and evasion by leveraging extensionPack and extensionDependencies to deliver the malicious payload by means of a transitive distribution model. Aikido Security also attributed the GlassWorm author to a mass campaign that compromised more than 151 GitHub repositories with malicious code concealed using invisible Unicode characters. The decoded payload is configured to fetch the C2 instructions from the same Solana wallet, indicating that the threat actor has been targeting GitHub repositories in multiple waves. The use of different delivery methods and code obfuscation methods, but the same Solana infrastructure, suggests ForceMemo is a new delivery vector maintained and operated by the GlassWorm threat actor, who has now expanded from compromising VS Code extensions to a broader GitHub account takeover. The attacker injects malware by force-pushing to the default branch of compromised repositories. This technique rewrites git history, preserves the original commit message and author, and leaves no pull request or commit trail in GitHub's UI. No other documented supply chain campaign uses this injection method.
Show sources
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
20.10.2025 19:13 13 articles · 4mo ago
GlassWorm malware campaign targets OpenVSX and VS Code registries
The Open VSX registry rotated access tokens after they were accidentally leaked by developers in public repositories, enabling the supply chain attack. The leak was discovered by Wiz researchers two weeks ago, exposing over 550 secrets across Microsoft VSCode and Open VSX marketplaces. Some leaked tokens could give access to projects with 150,000 downloads, allowing threat actors to upload malicious versions of extensions. The Open VSX team and the Eclipse Foundation clarified that GlassWorm was not self-replicating but targeted developer credentials. The reported download count of 35,800 includes inflated downloads generated by bots and visibility-boosting tactics. The threat actors behind GlassWorm have moved to GitHub, using the same Unicode steganography trick to hide their malicious payload in multiple repositories, primarily focused on JavaScript projects. GlassWorm has returned with three new VSCode extensions on OpenVSX, downloaded over 10,000 times. The new extensions are ai-driven-dev.ai-driven-dev (3,402 downloads), adhamu.history-in-sublime-merge (4,057 downloads), and yasuyuky.transient-emacs (2,431 downloads). The threat actors have posted a fresh transaction to the Solana blockchain, providing an updated C2 endpoint for downloading the next-stage payload. The attacker's server was inadvertently exposed, revealing a partial list of victims spanning the U.S., South America, Europe, and Asia, including a major government entity from the Middle East. The threat actor is assessed to be Russian-speaking and uses the open-source browser extension C2 framework named RedExt as part of their infrastructure. The Glassworm campaign is now in its third wave, with 24 new packages added on OpenVSX and Microsoft Visual Studio Marketplace. The malware now uses Rust-based implants and continues to employ invisible Unicode characters to hide malicious code. The packages target popular developer tools and frameworks, and the campaign uses artificially inflated download counts to manipulate search results. The third wave includes specific packages on both marketplaces, indicating a broad targeting scope. The new iteration of GlassWorm uses Rust-based implants packaged inside the extensions, targeting Windows and macOS systems. The implants fetch C2 server details from a Solana blockchain wallet address and use Google Calendar as a backup for C2 address retrieval. Additionally, a malicious Rust package named "evm-units" was discovered, targeting Windows, macOS, and Linux systems. This package, uploaded to crates.io in mid-April 2025, attracted over 7,000 downloads and was designed to stealthily execute on developer machines by masquerading as an Ethereum Virtual Machine (EVM) unit helper tool. The package checks for the presence of Qihoo 360 antivirus and alters its execution flow accordingly. The references to EVM and Uniswap indicate that the supply chain incident is designed to target developers in the Web3 space. The latest development involves the compromise of a legitimate developer's resources to push malicious updates to downstream users, with the malicious extensions having previously been presented as legitimate developer utilities and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases. A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems. The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times. GlassWorm attacks first appeared in late October, hiding the malicious code using "invisible" Unicode characters to steal cryptocurrency wallet and developer account details. The malware also supports VNC-based remote access and SOCKS proxying. Over time and across multiple attack waves, GlassWorm impacted both Microsoft's official Visual Studio Code marketplace and its open-source alternative for unsupported IDEs, OpenVSX. In a previous campaign, GlassWorm showed signs of evolution, targeting macOS systems, and its developers were working to add a replacement mechanism for the Trezor and Ledger apps. A new report from Socket's security team describes a new campaign that relied on trojanizing the following extensions: oorzc.ssh-tools v0.5.1, oorzc.i18n-tools-plus v1.6.8, oorzc.mind-map v1.0.61, oorzc.scss-to-css-compile v1.3.4. The malicious updates were pushed on January 30, and Socket reports that the extensions had been innocuous for two years. This suggests that the oorzc account was most likely compromised by GlassWorm operators. According to the researchers, the campaign targets macOS systems exclusively, pulling instructions from Solana transaction memos. Notably, Russian-locale systems are excluded, which may hint at the origin of the attacker. GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login. It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251. Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases. The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases. Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords. The GlassWorm campaign now abuses extensionPack and extensionDependencies to turn initially standalone-looking extensions into transitive delivery vehicles in later updates. The new extensions mimic widely used developer utilities and feature heavier obfuscation and Solana wallet rotation to evade detection. The campaign also affects 151 GitHub repositories and two npm packages using the same Unicode technique. Additionally, 88 new malicious npm packages were uploaded in three waves between November 2025 and February 2026, using Remote Dynamic Dependencies (RDD) to modify malicious code on the fly. The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of Python repositories. The attack targets Python projects including Django apps, ML research code, Streamlit dashboards, and PyPI packages by appending obfuscated code to files like setup.py, main.py, and app.py. The earliest injections date back to March 8, 2026. The attackers, upon gaining access to the developer accounts, rebase the latest legitimate commits on the default branch of the targeted repositories with malicious code, and then force-push the changes, while keeping the original commit's message, author, and author date intact. This new offshoot of the GlassWorm campaign has been codenamed ForceMemo. The Base64-encoded payload, appended to the end of the Python file, features GlassWorm-like checks to determine if the system has its locale set to Russian. If so, it skips execution. In all other cases, the malware queries the transaction memo field associated with a Solana wallet ("BjVeAjPrSKFiingBn4vZvghsGj9KCE8AJVtbc9S8o8SC") previously linked to GlassWorm to extract the payload URL. The earliest transaction on the C2 address dates to November 27, 2025 -- over three months before the first GitHub repo injections on March 8, 2026. The address has 50 transactions total, with the attacker regularly updating the payload URL, sometimes multiple times per day. The disclosure comes as Socket flagged a new iteration of the GlassWorm that technically retains the same core tradecraft while improving survivability and evasion by leveraging extensionPack and extensionDependencies to deliver the malicious payload by means of a transitive distribution model. Aikido Security also attributed the GlassWorm author to a mass campaign that compromised more than 151 GitHub repositories with malicious code concealed using invisible Unicode characters. The decoded payload is configured to fetch the C2 instructions from the same Solana wallet, indicating that the threat actor has been targeting GitHub repositories in multiple waves. The use of different delivery methods and code obfuscation methods, but the same Solana infrastructure, suggests ForceMemo is a new delivery vector maintained and operated by the GlassWorm threat actor, who has now expanded from compromising VS Code extensions to a broader GitHub account takeover. The attacker injects malware by force-pushing to the default branch of compromised repositories. This technique rewrites git history, preserves the original commit message and author, and leaves no pull request or commit trail in GitHub's UI. No other documented supply chain campaign uses this injection method.
Show sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
Information Snippets
-
GlassWorm uses invisible Unicode characters to hide malicious code.
First reported: 20.10.2025 19:132 sources, 12 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The malware steals credentials for GitHub, npm, and OpenVSX accounts, as well as cryptocurrency wallet data.
First reported: 20.10.2025 19:132 sources, 13 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
GlassWorm deploys a SOCKS proxy and VNC clients for remote access.
First reported: 20.10.2025 19:132 sources, 7 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The final payload, ZOMBI, turns infected systems into nodes for criminal activities.
First reported: 20.10.2025 19:132 sources, 6 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The malware uses the Solana blockchain for command-and-control, making takedowns difficult.
First reported: 20.10.2025 19:132 sources, 10 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
Google Calendar and BitTorrent’s Distributed Hash Table (DHT) are used for payload distribution and command distribution.
First reported: 20.10.2025 19:132 sources, 7 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
At least 11 extensions on OpenVSX and one on Microsoft’s VS Code Marketplace were compromised.
First reported: 20.10.2025 19:132 sources, 5 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The malware has been installed an estimated 35,800 times.
First reported: 20.10.2025 19:132 sources, 7 articlesShow sources
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registries — www.bleepingcomputer.com — 20.10.2025 19:13
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The GlassWorm malware is the second supply chain attack to hit the DevOps space within a month, following the Shai-Hulud worm that targeted the npm ecosystem in mid-September 2025.
First reported: 24.10.2025 10:002 sources, 4 articlesShow sources
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The first wave of GlassWorm infections occurred on October 17, 2025.
First reported: 24.10.2025 10:002 sources, 4 articlesShow sources
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The malicious code within the extensions searches for transactions associated with an attacker-controlled wallet on the Solana blockchain to extract a Base64-encoded string from the memo field.
First reported: 24.10.2025 10:002 sources, 4 articlesShow sources
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The Zombi payload includes WebRTC modules for peer-to-peer communication and BitTorrent's Distributed Hash Table (DHT) for decentralized command distribution.
First reported: 24.10.2025 10:002 sources, 4 articlesShow sources
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
VS Code extensions are configured to auto-update, allowing threat actors to push malicious code automatically without requiring user interaction.
First reported: 24.10.2025 10:002 sources, 6 articlesShow sources
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The GlassWorm campaign is designed to spread autonomously through the software development ecosystem.
First reported: 24.10.2025 10:002 sources, 6 articlesShow sources
- Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack — thehackernews.com — 24.10.2025 10:00
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Eclipse Foundation revoked a small number of leaked tokens within Visual Studio Code extensions.
First reported: 31.10.2025 10:022 sources, 4 articlesShow sources
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The GlassWorm campaign does not involve a self-replicating worm but requires stolen developer credentials to spread.
First reported: 31.10.2025 10:022 sources, 5 articlesShow sources
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The reported download count of 35,800 includes inflated downloads generated by bots and visibility-boosting tactics.
First reported: 31.10.2025 10:022 sources, 6 articlesShow sources
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Open VSX introduced a token prefix format "ovsxp_" to scan for exposed tokens.
First reported: 31.10.2025 10:022 sources, 5 articlesShow sources
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Open VSX is enforcing security changes to bolster the supply chain, including reducing token lifetime limits, making token revocation easier, and automated scanning of extensions.
First reported: 31.10.2025 10:022 sources, 5 articlesShow sources
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery — thehackernews.com — 31.10.2025 10:02
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The Open VSX registry rotated access tokens after they were accidentally leaked by developers in public repositories, enabling the supply chain attack.
First reported: 02.11.2025 17:092 sources, 4 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The leak was discovered by Wiz researchers two weeks ago, exposing over 550 secrets across Microsoft VSCode and Open VSX marketplaces.
First reported: 02.11.2025 17:092 sources, 4 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Some leaked tokens could give access to projects with 150,000 downloads, allowing threat actors to upload malicious versions of extensions.
First reported: 02.11.2025 17:092 sources, 6 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
Open VSX serves as a community-driven registry for VS Code-compatible extensions used on AI-powered forks like Cursor and Windsurf.
First reported: 02.11.2025 17:092 sources, 4 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The Open VSX team and the Eclipse Foundation clarified that GlassWorm was not self-replicating but targeted developer credentials.
First reported: 02.11.2025 17:092 sources, 5 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The reported download count of 35,800 includes inflated downloads generated by bots and visibility-boosting tactics.
First reported: 02.11.2025 17:092 sources, 4 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
Open VSX has implemented additional security measures, including shortening token lifetimes, faster revocation workflows, automated security scans, and threat intelligence sharing.
First reported: 02.11.2025 17:092 sources, 4 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
-
The threat actors behind GlassWorm have moved to GitHub, using the same Unicode steganography trick to hide their malicious payload in multiple repositories, primarily focused on JavaScript projects.
First reported: 02.11.2025 17:092 sources, 7 articlesShow sources
- Open VSX rotates access tokens used in supply-chain malware attack — www.bleepingcomputer.com — 02.11.2025 17:09
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
GlassWorm has returned with three new VSCode extensions on OpenVSX, downloaded over 10,000 times.
First reported: 08.11.2025 18:172 sources, 7 articlesShow sources
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The new extensions are ai-driven-dev.ai-driven-dev (3,400 downloads), adhamu.history-in-sublime-merge (4,000 downloads), and yasuyuky.transient-emacs (2,400 downloads).
First reported: 08.11.2025 18:172 sources, 7 articlesShow sources
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
GlassWorm operators are Russian-speaking and use the RedExt open-source C2 browser extension framework.
First reported: 08.11.2025 18:172 sources, 6 articlesShow sources
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
GlassWorm has impacted systems globally, including the United States, South America, Europe, Asia, and a government entity in the Middle East.
First reported: 08.11.2025 18:172 sources, 6 articlesShow sources
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
Koi Security accessed the attackers' server and obtained key data on victims, including user IDs for multiple cryptocurrency exchanges and messaging platforms.
First reported: 08.11.2025 18:172 sources, 6 articlesShow sources
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensions — www.bleepingcomputer.com — 08.11.2025 18:17
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The threat actors have posted a fresh transaction to the Solana blockchain, providing an updated C2 endpoint for downloading the next-stage payload.
First reported: 10.11.2025 10:512 sources, 5 articlesShow sources
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The attacker's server was inadvertently exposed, revealing a partial list of victims spanning the U.S., South America, Europe, and Asia, including a major government entity from the Middle East.
First reported: 10.11.2025 10:512 sources, 5 articlesShow sources
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The threat actor is assessed to be Russian-speaking and uses the open-source browser extension C2 framework named RedExt as part of their infrastructure.
First reported: 10.11.2025 10:512 sources, 5 articlesShow sources
- GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs — thehackernews.com — 10.11.2025 10:51
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
Glassworm campaign is now in its third wave, with 24 new packages added on OpenVSX and Microsoft Visual Studio Marketplace.
First reported: 01.12.2025 23:082 sources, 6 articlesShow sources
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The third wave of Glassworm uses Rust-based implants packaged inside the extensions.
First reported: 01.12.2025 23:082 sources, 6 articlesShow sources
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The packages target popular tools and developer frameworks like Flutter, Vim, Yaml, Tailwind, Svelte, React Native, and Vue.
First reported: 01.12.2025 23:082 sources, 6 articlesShow sources
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The malware uses artificially inflated download counts to manipulate search results and appear legitimate.
First reported: 01.12.2025 23:082 sources, 6 articlesShow sources
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The third wave of Glassworm includes packages such as iconkieftwo.icon-theme-materiall, prisma-inc.prisma-studio-assistance, prettier-vsc.vsce-prettier, flutcode.flutter-extension, csvmech.csvrainbow, codevsce.codelddb-vscode, saoudrizvsce.claude-devsce, clangdcode.clangd-vsce, cweijamysq.sync-settings-vscode, bphpburnsus.iconesvscode, klustfix.kluster-code-verify, vims-vsce.vscode-vim, yamlcode.yaml-vscode-extension, solblanco.svetle-vsce, vsceue.volar-vscode, redmat.vscode-quarkus-pro, msjsdreact.react-native-vsce on VS Marketplace and bphpburn.icons-vscode, tailwind-nuxt.tailwindcss-for-react, flutcode.flutter-extension, yamlcode.yaml-vscode-extension, saoudrizvsce.claude-dev, saoudrizvsce.claude-devsce, vitalik.solidity on Open VSX.
First reported: 01.12.2025 23:082 sources, 6 articlesShow sources
- Glassworm malware returns in third wave of malicious VS Code packages — www.bleepingcomputer.com — 01.12.2025 23:08
- GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools — thehackernews.com — 02.12.2025 17:01
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
A malicious Rust package named "evm-units" was uploaded to crates.io in mid-April 2025 by a user named "ablerust."
First reported: 03.12.2025 10:392 sources, 4 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The package "evm-units" attracted more than 7,000 downloads over the past eight months.
First reported: 03.12.2025 10:392 sources, 4 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
Another package created by the same author, "uniswap-utils," listed "evm-units" as a dependency and was downloaded over 7,400 times.
First reported: 03.12.2025 10:392 sources, 4 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The packages have since been removed from the package repository.
First reported: 03.12.2025 10:392 sources, 4 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The package is designed to check for the presence of the "qhsafetray.exe" process, an executable file associated with 360 Total Security.
First reported: 03.12.2025 10:392 sources, 4 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
On Linux, the package downloads a script, saves it in /tmp/init, and runs it in the background using the nohup command.
First reported: 03.12.2025 10:392 sources, 4 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
On macOS, the package downloads a file called init and runs it using osascript in the background with the nohup command.
First reported: 03.12.2025 10:392 sources, 4 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
On Windows, the package downloads and saves the payload as a PowerShell script file ("init.ps1") in the temp directory and checks running processes for "qhsafetray.exe," before invoking the script.
First reported: 03.12.2025 10:392 sources, 4 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
If the antivirus process is not present, the package creates a Visual Basic Script wrapper that runs a hidden PowerShell script with no visible window.
First reported: 03.12.2025 10:392 sources, 4 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
If the antivirus process is detected, the package slightly alters its execution flow by directly invoking PowerShell.
First reported: 03.12.2025 10:392 sources, 4 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The references to EVM and Uniswap indicate that the supply chain incident is designed to target developers in the Web3 space.
First reported: 03.12.2025 10:392 sources, 4 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The threat actor responsible for the malicious code embedded a cross-platform second-stage loader inside a seemingly harmless function.
First reported: 03.12.2025 10:392 sources, 5 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The dependency was pulled into another widely used package (uniswap-utils), allowing the malicious code to execute automatically during initialization.
First reported: 03.12.2025 10:392 sources, 4 articlesShow sources
- Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems — thehackernews.com — 03.12.2025 10:39
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
GlassWorm malware was spread through compromised developer accounts on Open VSX.
First reported: 02.02.2026 07:042 sources, 3 articlesShow sources
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The malicious extensions had previously been presented as legitimate developer utilities and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases.
First reported: 02.02.2026 07:042 sources, 3 articlesShow sources
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The compromised extensions include FTP/SFTP/SSH Sync Tool (oorzc.ssh-tools), I18n Tools (oorzc.i18n-tools-plus), vscode mindmap (oorzc.mind-map), and scss to css (oorzc.scss-to-css-compile).
First reported: 02.02.2026 07:042 sources, 3 articlesShow sources
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The malware targets data from Mozilla Firefox and Chromium-based browsers, cryptocurrency wallet files, iCloud Keychain database, Safari cookies, Apple Notes, user documents, FortiClient VPN configuration files, and developer credentials.
First reported: 02.02.2026 07:042 sources, 3 articlesShow sources
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The malware includes routines to locate and extract authentication material used in common workflows, including inspecting npm configuration for _authToken and referencing GitHub authentication artifacts.
First reported: 02.02.2026 07:042 sources, 3 articlesShow sources
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
-
The threat actor blends into normal developer workflows, hides execution behind encrypted, runtime-decrypted loaders, and uses Solana memos as a dynamic dead drop to rotate staging infrastructure without republishing extensions.
First reported: 02.02.2026 07:042 sources, 4 articlesShow sources
- Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm — thehackernews.com — 02.02.2026 07:04
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times.
First reported: 03.02.2026 00:042 sources, 3 articlesShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
GlassWorm attacks first appeared in late October, hiding the malicious code using "invisible" Unicode characters to steal cryptocurrency wallet and developer account details.
First reported: 03.02.2026 00:042 sources, 3 articlesShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The malware also supports VNC-based remote access and SOCKS proxying.
First reported: 03.02.2026 00:042 sources, 3 articlesShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
GlassWorm targeted macOS systems exclusively, pulling instructions from Solana transaction memos.
First reported: 03.02.2026 00:042 sources, 3 articlesShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
Russian-locale systems are excluded, which may hint at the origin of the attacker.
First reported: 03.02.2026 00:042 sources, 3 articlesShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login.
First reported: 03.02.2026 00:042 sources, 3 articlesShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251.
First reported: 03.02.2026 00:042 sources, 3 articlesShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases.
First reported: 03.02.2026 00:042 sources, 3 articlesShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases.
First reported: 03.02.2026 00:042 sources, 3 articlesShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords.
First reported: 03.02.2026 00:042 sources, 3 articlesShow sources
- New GlassWorm attack targets macOS via compromised OpenVSX extensions — www.bleepingcomputer.com — 03.02.2026 00:04
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
GlassWorm campaign now abuses extensionPack and extensionDependencies to turn initially standalone-looking extensions into transitive delivery vehicles in later updates.
First reported: 14.03.2026 14:551 source, 2 articlesShow sources
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
At least 72 additional malicious Open VSX extensions were discovered since January 31, 2026.
First reported: 14.03.2026 14:551 source, 2 articlesShow sources
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The new extensions mimic widely used developer utilities, including linters and formatters, code runners, and tools for AI-powered coding assistants.
First reported: 14.03.2026 14:551 source, 2 articlesShow sources
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The latest iteration of GlassWorm features heavier obfuscation and rotates Solana wallets to evade detection.
First reported: 14.03.2026 14:551 source, 2 articlesShow sources
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The campaign uses one extension as an installer for another extension that's malicious.
First reported: 14.03.2026 14:551 source, 2 articlesShow sources
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
151 GitHub repositories are estimated to have been affected as part of the campaign between March 3 and March 9, 2026.
First reported: 14.03.2026 14:551 source, 2 articlesShow sources
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
Two npm packages, @aifabrix/miso-client and @iflow-mcp/watercrawl-watercrawl-mcp, were also affected by the same Unicode technique.
First reported: 14.03.2026 14:551 source, 2 articlesShow sources
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The malicious injections in GitHub repositories do not arrive in obviously suspicious commits and are stylistically consistent with each target project.
First reported: 14.03.2026 14:551 source, 2 articlesShow sources
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
88 new malicious npm packages were uploaded in three waves between November 2025 and February 2026 via 50 disposable accounts.
First reported: 14.03.2026 14:551 source, 2 articlesShow sources
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The packages use Remote Dynamic Dependencies (RDD) to allow operators to modify the malicious code on the fly and bypass inspection.
First reported: 14.03.2026 14:551 source, 2 articlesShow sources
- GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers — thehackernews.com — 14.03.2026 14:55
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
GlassWorm malware campaign is being used to fuel an ongoing attack that leverages stolen GitHub tokens to inject malware into hundreds of Python repositories.
First reported: 16.03.2026 21:371 source, 1 articleShow sources
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The attack targets Python projects including Django apps, ML research code, Streamlit dashboards, and PyPI packages by appending obfuscated code to files like setup.py, main.py, and app.py.
First reported: 16.03.2026 21:371 source, 1 articleShow sources
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The earliest injections date back to March 8, 2026.
First reported: 16.03.2026 21:371 source, 1 articleShow sources
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The attackers, upon gaining access to the developer accounts, rebase the latest legitimate commits on the default branch of the targeted repositories with malicious code, and then force-push the changes, while keeping the original commit's message, author, and author date intact.
First reported: 16.03.2026 21:371 source, 1 articleShow sources
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
This new offshoot of the GlassWorm campaign has been codenamed ForceMemo.
First reported: 16.03.2026 21:371 source, 1 articleShow sources
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The Base64-encoded payload, appended to the end of the Python file, features GlassWorm-like checks to determine if the system has its locale set to Russian. If so, it skips execution.
First reported: 16.03.2026 21:371 source, 1 articleShow sources
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
In all other cases, the malware queries the transaction memo field associated with a Solana wallet ("BjVeAjPrSKFiingBn4vZvghsGj9KCE8AJVtbc9S8o8SC") previously linked to GlassWorm to extract the payload URL.
First reported: 16.03.2026 21:371 source, 1 articleShow sources
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The earliest transaction on the C2 address dates to November 27, 2025 -- over three months before the first GitHub repo injections on March 8, 2026.
First reported: 16.03.2026 21:371 source, 1 articleShow sources
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The address has 50 transactions total, with the attacker regularly updating the payload URL, sometimes multiple times per day.
First reported: 16.03.2026 21:371 source, 1 articleShow sources
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The disclosure comes as Socket flagged a new iteration of the GlassWorm that technically retains the same core tradecraft while improving survivability and evasion by leveraging extensionPack and extensionDependencies to deliver the malicious payload by means of a transitive distribution model.
First reported: 16.03.2026 21:371 source, 1 articleShow sources
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
Aikido Security also attributed the GlassWorm author to a mass campaign that compromised more than 151 GitHub repositories with malicious code concealed using invisible Unicode characters.
First reported: 16.03.2026 21:371 source, 1 articleShow sources
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The decoded payload is configured to fetch the C2 instructions from the same Solana wallet, indicating that the threat actor has been targeting GitHub repositories in multiple waves.
First reported: 16.03.2026 21:371 source, 1 articleShow sources
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The use of different delivery methods and code obfuscation methods, but the same Solana infrastructure, suggests ForceMemo is a new delivery vector maintained and operated by the GlassWorm threat actor, who has now expanded from compromising VS Code extensions to a broader GitHub account takeover.
First reported: 16.03.2026 21:371 source, 1 articleShow sources
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
-
The attacker injects malware by force-pushing to the default branch of compromised repositories. This technique rewrites git history, preserves the original commit message and author, and leaves no pull request or commit trail in GitHub's UI. No other documented supply chain campaign uses this injection method.
First reported: 16.03.2026 21:371 source, 1 articleShow sources
- GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos — thehackernews.com — 16.03.2026 21:37
Similar Happenings
Iran-linked Dust Specter Targets Iraqi Officials with AI-Assisted Malware
An Iran-linked cyber threat actor, Dust Specter, has been targeting Iraqi government officials using AI-powered tools and previously undocumented malware. The campaign, detected in January 2026, involves impersonating the Iraqi Ministry of Foreign Affairs and compromising government infrastructure to host malicious payloads. The attack chains include the use of SplitDrop, TwinTask, TwinTalk, and GhostForm malware, with TwinTalk also linked to a previous campaign in July 2025. The campaign employs advanced techniques such as randomly generated URI paths for C2 communication, geofencing, and User-Agent verification. The use of compromised Iraqi government infrastructure and AI-assisted malware development highlights the sophistication of the attack.
PromptSpy Android Malware Uses Gemini AI for Persistence
PromptSpy, an advanced Android malware, uses Google's Gemini AI to maintain persistence by pinning itself in the recent apps list. The malware captures lockscreen data, blocks uninstallation, gathers device information, takes screenshots, and records screen activity. It communicates with a hard-coded C2 server and is distributed via a dedicated website targeting users in Argentina. PromptSpy is the first known Android malware to use generative AI in its execution flow, sending screen data to Gemini to receive instructions for maintaining persistence. The malware is an advanced version of VNCSpy and is likely financially motivated. Researchers have discovered that PromptSpy was first found in February 2026, with initial samples uploaded to VirusTotal from Hong Kong and Argentina. ESET has not observed the malware in its telemetry, suggesting it may be a proof-of-concept. ESET attributed PromptSpy to Chinese developers with medium confidence, but has not linked it to any known threat actor. PromptSpy deploys a VNC module on compromised systems, enabling operators to view the victim’s screen and take full control of the Android device. The malware saves both its previous prompts and Gemini’s responses, allowing Gemini to understand context and coordinate multistep interactions.
Infostealer Malware Targets OpenClaw Configuration Files
Infostealer malware has been observed stealing OpenClaw configuration files containing API keys, authentication tokens, and other sensitive secrets. This marks the first known instance of such attacks targeting the popular AI assistant framework. The stolen data includes configuration details, authentication tokens, and persistent memory files, which could enable full compromise of the victim's digital identity. The malware, identified as a variant of the Vidar infostealer, executed a broad file-stealing routine that scanned for sensitive keywords. Researchers predict increased targeting of OpenClaw as it becomes more integrated into professional workflows. Additionally, security issues with OpenClaw have prompted the maintainers to partner with VirusTotal to scan for malicious skills uploaded to ClawHub, establish a threat model, and add the ability to audit for potential misconfigurations.
SSHStalker Linux Botnet Uses IRC for C2 Communications
A new Linux botnet named SSHStalker has been documented, utilizing the outdated IRC protocol for command-and-control (C2) operations. The botnet employs classic IRC mechanics, including multiple C-based bots and multi-server/channel redundancy, prioritizing resilience and scale over stealth. It achieves initial access through automated SSH scanning and brute-forcing, using a Go binary disguised as nmap. Once infected, hosts are used to scan for additional SSH targets, and the botnet includes exploits for 16 CVEs targeting older Linux kernel versions. The botnet also performs AWS key harvesting, website scanning, and includes cryptomining kits and DDoS capabilities. Notably, SSHStalker maintains persistent access without immediate follow-on post-exploitation behavior, suggesting it may be used for staging, testing, or strategic access retention. The threat actor is suspected to be of Romanian origin, with operational overlaps with the hacking group Outlaw (aka Dota).
Malicious OpenClaw AI Coding Assistant Extension on VS Code Marketplace
A malicious Microsoft Visual Studio Code (VS Code) extension named "ClawdBot Agent - AI Coding Assistant" was discovered on the official Extension Marketplace. The extension, which posed as a free AI coding assistant, stealthily dropped a malicious payload on compromised hosts. The extension was taken down by Microsoft after being reported by cybersecurity researchers. The malicious extension executed a binary named "Code.exe" that deployed a legitimate remote desktop program, granting attackers persistent remote access to compromised hosts. The extension also incorporated multiple fallback mechanisms to ensure payload delivery, including retrieving a DLL from Dropbox and using hard-coded URLs to obtain the payloads. Additionally, security researchers found hundreds of unauthenticated Moltbot instances online, exposing sensitive data and credentials. Moltbot, an open-source personal AI assistant, can run 24/7 locally, maintaining a persistent memory and executing scheduled tasks. However, insecure deployments can lead to sensitive data leaks, corporate data exposure, credential theft, and command execution. Hundreds of Clawdbot Control admin interfaces are exposed online due to reverse proxy misconfiguration, allowing unauthenticated access and root-level system access. More than 230 malicious packages for OpenClaw (formerly Moltbot and ClawdBot) have been published in less than a week on the tool's official registry and on GitHub. These malicious skills impersonate legitimate utilities and inject information-stealing malware payloads onto users' systems, targeting sensitive data like API keys, wallet private keys, SSH credentials, and browser passwords. Users are advised to audit their configurations, revoke connected service integrations, and implement network controls to mitigate potential risks. A self-styled social networking platform built for AI agents, Moltbook, contained a misconfigured database that allowed full read and write access to all data. The exposure was due to a Supabase API key exposed in client-side JavaScript, granting unauthenticated access to the entire production database. Researchers accessed 1.5 million API authentication tokens, 30,000 email addresses, and thousands of private messages between agents. The API key exposure allowed attackers to impersonate any agent on the platform, post content, send messages, and interact as that agent. Unauthenticated users could edit existing posts, inject malicious content or prompt injection payloads, and deface the site. SecurityScorecard found 40,214 exposed OpenClaw instances associated with 28,663 unique IP addresses. 63% of observed deployments are vulnerable, with 12,812 instances exploitable via remote code execution (RCE) attacks. SecurityScorecard correlated 549 instances with prior breach activity and 1493 with known vulnerabilities. Three high-severity CVEs in OpenClaw have been discovered, with public exploit code available. OpenClaw instances are at risk of indirect prompt injection and API key leaks, with most exposures located in China, the US, and Singapore. A supply chain attack via the Cline npm package version 2.3.0 installed OpenClaw on users' systems, exploiting a prompt injection vulnerability in Cline's Claude Issue Triage workflow. The compromised Cline package was downloaded approximately 4,000 times over an eight-hour stretch. OpenClaw has broad permissions and full disk access, making it a high-value implant for attackers. Cline released version 2.4.0 to address the issue and revoked the compromised token. The attack affected all users who installed the Cline CLI package version 2.3.0 during an eight-hour window on February 17, 2026. The attack did not impact Cline's Visual Studio Code (VS Code) extension and JetBrains plugin. Cline maintainers released version 2.4.0 to mitigate the unauthorized publication and revoked the compromised token. Microsoft Threat Intelligence observed a small but noticeable uptick in OpenClaw installations on February 17, 2026, due to the supply chain compromise. Users are advised to update to the latest version, check their environment for any unexpected installation of OpenClaw, and remove it if not required. China's National Computer Network Emergency Response Technical Team (CNCERT) has issued a warning about the security risks stemming from the use of OpenClaw, an open-source and self-hosted autonomous AI agent. OpenClaw's inherently weak default security configurations and privileged access to the system could be exploited by bad actors to seize control of the endpoint. Prompt injections in OpenClaw can cause the agent to leak sensitive information if tricked into accessing and consuming malicious content. Indirect prompt injection (IDPI) or cross-domain prompt injection (XPIA) attacks can manipulate benign AI features like web page summarization or content analysis to run manipulated instructions. Researchers at PromptArmor found that the link preview feature in messaging apps like Telegram or Discord can be turned into a data exfiltration pathway when communicating with OpenClaw. OpenClaw may inadvertently and irrevocably delete critical information due to its misinterpretation of user instructions. Threat actors can upload malicious skills to repositories like ClawHub that, when installed, run arbitrary commands or deploy malware. Attackers can exploit recently disclosed security vulnerabilities in OpenClaw to compromise the system and leak sensitive data. Chinese authorities have moved to restrict state-run enterprises and government agencies from running OpenClaw AI apps on office computers. Threat actors have distributed malicious GitHub repositories posing as OpenClaw installers to deploy information stealers like Atomic and Vidar Stealer, and a Golang-based proxy malware known as GhostSocks.