Malware & RansomwareHIGH

GlassWorm Malware Expands Reach with 72 Malicious Extensions

CSCyber Security News·Reporting by Dhivya
📰 7 sources·Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, a new malware called GlassWorm tricks developers by hiding in software updates.

Quick Summary

The GlassWorm malware campaign has escalated, infecting developer environments through 72 malicious Open VSX extensions. Developers using popular tools are at risk, as attackers employ clever tricks to bypass security measures. Immediate action is necessary to protect sensitive data and maintain secure coding practices.

What Happened

In a significant escalation of supply chain attacks, the GlassWorm malware campaign has evolved to target developer environments. On March 13, 2026, the Socket Research Team reported discovering at least 72 new malicious Open VSX extensions associated with this campaign. Instead of embedding the malicious payload directly, attackers now use a clever technique that involves transitive dependencies, allowing them to infect systems after initial trust is established.

The attackers disguise their malicious software by first publishing seemingly harmless extensions. Once developers install these extensions and trust them, the attackers push out updates that modify the extension’s manifest files. This hidden update links to a separate GlassWorm loader, which is installed automatically in the background. This approach makes it nearly impossible for standard code reviews to catch the malicious activity.

Who's Being Targeted

The GlassWorm campaign primarily targets developers, particularly those using popular tools and programming languages. The malicious extensions impersonate widely-used utilities like Prettier and ESLint, as well as language-specific tools for Python, Vue, Angular, and Flutter. Notably, the campaign also targets developers utilizing AI tools, with extensions mimicking popular AI assistants like Claude Code and Codex.

To enhance their deception, attackers have employed typosquatting techniques, where they create extensions with slight variations of legitimate publisher names. This strategy aims to trick unsuspecting developers into believing they are downloading safe tools, thus increasing the likelihood of infection.

Signs of Infection

The latest variants of GlassWorm exhibit advanced capabilities that make detection challenging. Some indicators of compromise include:

  • Infrastructure rotation: Attackers have changed their wallet infrastructure and command-and-control IP addresses to evade detection.
  • Advanced obfuscation: The malware now uses complex techniques to hide its true nature, making it harder for security tools to identify.
  • Remote decryption: Decryption keys are fetched dynamically from attacker-controlled servers, rather than being embedded in the extension.

These features allow the malware to remain resilient and evade traditional security measures, posing a significant threat to developer environments.

How to Protect Yourself

To defend against the GlassWorm threat, development teams must adopt new security practices. Here are some recommended actions:

  • Audit version history: Regularly check the version history of installed extensions for any newly introduced relationships that could indicate malicious activity.
  • Review update chains: Instead of only scanning the current extension code, examine the entire installation and update history.
  • Hunt for indicators of compromise: Look for signs such as Solana memo lookups or unusual locale gating in the code.
  • Remove known threats: Immediately block and uninstall any identified GlassWorm-linked packages from workstations and check for exposed environment tokens.

By implementing these measures, developers can better safeguard their environments against the evolving GlassWorm malware campaign.

🔒 Pro insight: The GlassWorm campaign's use of transitive dependencies marks a troubling trend in supply chain attacks, necessitating enhanced vigilance in extension management.

Original article from

CSCyber Security News· Dhivya
Read Full Article

Also covered by

CSCSO Online

Open VSX extensions hijacked: GlassWorm malware spreads via dependency abuse

Read Article
THThe Hacker News

GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers

Read Article
DADark Reading

GlassWorm Malware Evolves to Hide in Dependencies

Read Article

Related Pings

HIGHMalware & Ransomware

Malware Newsletter Round 91 - Latest Threats and Insights

The latest malware newsletter reveals new threats like Infiniti Stealer and npm supply chain attacks. Developers and organizations must stay alert to evolving risks in cybersecurity.

Security Affairs·
HIGHMalware & Ransomware

Malicious Email Delivers CMD Malware - Privilege Escalation Alert

A malicious email has delivered a .cmd malware file that escalates privileges and bypasses antivirus systems. Users are at risk of significant system compromise. Awareness and immediate action are vital to mitigate this threat.

Security Affairs·
HIGHMalware & Ransomware

Axios NPM Package Compromised - Supply Chain Attack Exposed

A major supply chain attack compromised the Axios NPM package, affecting millions of users. Malicious versions deployed a RAT, posing serious security risks. Swift action was taken to remove the threats.

Trend Micro Research·
HIGHMalware & Ransomware

Brokk Hacked - Play Ransomware Exposes Sensitive Data

Brokk has reportedly been hacked by Play ransomware, leading to the leak of sensitive corporate data. This incident could severely impact the company's reputation and security. Organizations must bolster their defenses to prevent similar breaches.

SC Media·
HIGHMalware & Ransomware

Chaos Malware - New Targeting of 64-bit Linux Servers

Chaos malware has evolved to target 64-bit Linux servers, expanding its attack surface. This shift raises alarms for organizations relying on these systems. Enhanced security measures are now crucial to protect against potential larger-scale attacks.

SC Media·
HIGHMalware & Ransomware

Phorpiex Botnet - Spreading Ransomware and Sextortion Tactics

The notorious Phorpiex botnet is back, spreading ransomware and sextortion schemes. Millions are at risk as it targets users globally. Stay alert and protect your devices from this evolving threat.

Cyber Security News·