A new security alert shows how fragile the code distribution chain can be: malicious actors managed to manipulate legitimate updates hosted in the Open VSX record to spread a malware charger known as GlassWorm. The research published by the firm Socket describes how extensions held by a legitimate developer were updated with contaminated versions that, before their elimination, had accumulated tens of thousands of downloads.
Open VSX is an open platform for publishing extensions compatible with Visual Studio Code editors, and its ecosystem makes it easier for day-to-day productivity and utility tools to reach programmers around the world. It is precisely that trust and scope that make this type of repository attractive targets for attackers who want to maximize the impact of their malicious code. The technical explanation and forensic analysis of the incident can be found in the report published by Socket Here., and the repository concerned also recorded public discussion in GitHub about the intrusion in this incidence.

According to the available analysis, the attack mechanism was not the creation of false packages with similar names or a typosquating scam on this occasion: the attackers would have obtained access to the publication credentials of a real developer and used that account to upload malicious versions of already popular extensions. For this reason the samples passed relatively unnoticed at first, until the malicious behavior was detected and the compromised versions were removed from the record.
The software delivered in the updates acts as a charger: that is, a component designed to decipher and run additional code in running time. Socket links these loads to the GlassWorm family, which uses increasingly sophisticated techniques to hide their communications and command and control servers. These techniques include what researchers describe as "EtherHelling" and the use of memos in the Solana network as a dynamic mechanism to publish alternative contact points without the need to redistribute the malicious extension.
The behavior of malware shows a recognition phase before it is activated: the code assesses the environment of the victim machine and avoids detonating if it detects a local configuration of Russia or related territories, a common practice between campaigns attributed to Russian-speaking actors seeking to reduce the possibility of legal action against their own. When the execution continues, the main objective of the actor is to collect credentials and sensitive data.
The information pieces that GlassWorm is looking for range from browser credentials and cookies - both Firefox and Chromium-based browsers, including Web3 and MetaMask billboards extensions - to cryptomoneda billboards files (e.g., Electrum, Exodus, and hardware / software solutions such as Ledger Live and Trezor Suite). In addition, according to the research, the shipper attempts to extract data from the iCloud key, Safari cookies, local notes and documents, VPN client settings (cited as FortiClient) and developer-used artifacts, such as npm settings with authentication tokens or GitHub credentials that could allow access to private repositories and CI / CD secrets.
Stealing access to development tools and credentials on a developer's machine is especially dangerous because it facilitates side movements and cloud account commitments: with a token or private key you can run deployments, access infrastructure or activate automations that affect an entire organization. The experts therefore stress that the threat is not only an individual but a business threat.
Another relevant aspect of the incident is how the attacker tries to be confused with the normal workflows of the developer. Instead of based only on static indicators - concrete hashes or URLs that change frequently - the malware operator uses encrypted loads that are decoded in memory and a control infrastructure that is broken by public signals in lockchain, which makes it difficult to detect traditional signatures based and increases the need for detection by behavior and agile response. Socket explains these tactics and the difficulty they involve for defenders in his report Here..

For users and administrators, the mitigation recipe is measured on several fronts: review and revoke committed credentials, force the rotation of tokens and keys, enable multi-factor authentication for publishing accounts and repositories, and audit CI / CD environments by suspicious devices. It is also important to monitor atypical behaviors in endpoints, such as processes that decipher and execute blobs in memory or connections to unusual domains / schemes. Institutional resources on supply chain security and good practices are available on official pages such as CISA on supply chain security Here. and documentation on the management of secrets and security on development platforms is useful for reducing risks.
For developers who publish extensions, the lesson is double: to protect the publishing process with robust controls, and to assume that any artifact that reaches the end user can be quickly audited and reversed. Maintain verified copies of packages, record and limit publication tokens, review access records and use automatic unit scanning are practices that reduce the exposure window. GitHub and other suppliers provide safety guides for these scenarios; it is advisable to review and apply them in workflows.
Ultimately, this incident recalls that software security does not start or end in the code we write: confidence in tools and distribution chains is critical and must be managed with the same seriousness as infrastructure protection. For those who want to deepen the technical details and evidence of the case, Socket's analysis and the discussion of the repository concerned offer a reliable starting point: Socket report, thread in GitHub and the registration page Open VSX to follow the actions taken by the community.
Related
More news on the same subject.

Safety alert Drug critical vulnerability of SQL injection in PostgreSQL requires immediate update
Drucal has published safety updates for a vulnerability qualified as "highly critical" which affects Drumal Core and allows an attacker to achieve arbitrary SQL injection in sit...

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...