Attack the GlassWorm extension supply chain steals credentials from Open VSX

Published 5 min de lectura 147 reading

A new security alert shows how fragile the code distribution chain can be: malicious actors managed to manipulate legitimate updates hosted in the Open VSX record to spread a malware charger known as GlassWorm. The research published by the firm Socket describes how extensions held by a legitimate developer were updated with contaminated versions that, before their elimination, had accumulated tens of thousands of downloads.

Open VSX is an open platform for publishing extensions compatible with Visual Studio Code editors, and its ecosystem makes it easier for day-to-day productivity and utility tools to reach programmers around the world. It is precisely that trust and scope that make this type of repository attractive targets for attackers who want to maximize the impact of their malicious code. The technical explanation and forensic analysis of the incident can be found in the report published by Socket Here., and the repository concerned also recorded public discussion in GitHub about the intrusion in this incidence.

Attack the GlassWorm extension supply chain steals credentials from Open VSX
Image generated with IA.

According to the available analysis, the attack mechanism was not the creation of false packages with similar names or a typosquating scam on this occasion: the attackers would have obtained access to the publication credentials of a real developer and used that account to upload malicious versions of already popular extensions. For this reason the samples passed relatively unnoticed at first, until the malicious behavior was detected and the compromised versions were removed from the record.

The software delivered in the updates acts as a charger: that is, a component designed to decipher and run additional code in running time. Socket links these loads to the GlassWorm family, which uses increasingly sophisticated techniques to hide their communications and command and control servers. These techniques include what researchers describe as "EtherHelling" and the use of memos in the Solana network as a dynamic mechanism to publish alternative contact points without the need to redistribute the malicious extension.

The behavior of malware shows a recognition phase before it is activated: the code assesses the environment of the victim machine and avoids detonating if it detects a local configuration of Russia or related territories, a common practice between campaigns attributed to Russian-speaking actors seeking to reduce the possibility of legal action against their own. When the execution continues, the main objective of the actor is to collect credentials and sensitive data.

The information pieces that GlassWorm is looking for range from browser credentials and cookies - both Firefox and Chromium-based browsers, including Web3 and MetaMask billboards extensions - to cryptomoneda billboards files (e.g., Electrum, Exodus, and hardware / software solutions such as Ledger Live and Trezor Suite). In addition, according to the research, the shipper attempts to extract data from the iCloud key, Safari cookies, local notes and documents, VPN client settings (cited as FortiClient) and developer-used artifacts, such as npm settings with authentication tokens or GitHub credentials that could allow access to private repositories and CI / CD secrets.

Stealing access to development tools and credentials on a developer's machine is especially dangerous because it facilitates side movements and cloud account commitments: with a token or private key you can run deployments, access infrastructure or activate automations that affect an entire organization. The experts therefore stress that the threat is not only an individual but a business threat.

Another relevant aspect of the incident is how the attacker tries to be confused with the normal workflows of the developer. Instead of based only on static indicators - concrete hashes or URLs that change frequently - the malware operator uses encrypted loads that are decoded in memory and a control infrastructure that is broken by public signals in lockchain, which makes it difficult to detect traditional signatures based and increases the need for detection by behavior and agile response. Socket explains these tactics and the difficulty they involve for defenders in his report Here..

Attack the GlassWorm extension supply chain steals credentials from Open VSX
Image generated with IA.

For users and administrators, the mitigation recipe is measured on several fronts: review and revoke committed credentials, force the rotation of tokens and keys, enable multi-factor authentication for publishing accounts and repositories, and audit CI / CD environments by suspicious devices. It is also important to monitor atypical behaviors in endpoints, such as processes that decipher and execute blobs in memory or connections to unusual domains / schemes. Institutional resources on supply chain security and good practices are available on official pages such as CISA on supply chain security Here. and documentation on the management of secrets and security on development platforms is useful for reducing risks.

For developers who publish extensions, the lesson is double: to protect the publishing process with robust controls, and to assume that any artifact that reaches the end user can be quickly audited and reversed. Maintain verified copies of packages, record and limit publication tokens, review access records and use automatic unit scanning are practices that reduce the exposure window. GitHub and other suppliers provide safety guides for these scenarios; it is advisable to review and apply them in workflows.

Ultimately, this incident recalls that software security does not start or end in the code we write: confidence in tools and distribution chains is critical and must be managed with the same seriousness as infrastructure protection. For those who want to deepen the technical details and evidence of the case, Socket's analysis and the discussion of the repository concerned offer a reliable starting point: Socket report, thread in GitHub and the registration page Open VSX to follow the actions taken by the community.

Coverage

Related

More news on the same subject.