A new wave of the campaign known as GlassWorm has rehit the ecosystem of editor extensions by appearing 73 "sleeping" packages in OpenVSX, of which six have already been activated and deliver malicious load, according to the research published by Socket. The technique used is of concern for its simplicity and effectiveness: the extensions are initially uploaded as harmless devices and, after a later update, change their behavior to download and install additional code or to load compiled modules (.node) that contain malicious logic.
What makes this campaign particularly insidious is the visual supplanting tactic of legitimate listings: icons, names and very similar descriptions that deceive the developer who trusts the appearance rather than verify the unique editor or identifier. In many cases, the first package acts as a light "loader" that, in running time, downloads VSIX packages from repositories in GitHub, runs CLI commands to install them, or runs heavily obfuscated JavaScript code that disfigures backup URLs and payloads.

The potential impact is not just the remote execution of code on a developer's machine: it is a gateway to sensitive secrets. previous GlassWorm campaigns have looked for cryptomoneda portfolio keys, credentials, access tokens, SSH keys and development environment data. If a single committed workstation can exfilter CI / CD or tokens credentials that give access to repositories and cloud services, the scope can quickly scale to infrastructure commitments and supply chains.
If you think you have installed any of the extensions involved, the first thing is to take on a possible exposure and act quickly: Uninstall suspicious extensions, checks unusual network processes and connections, isolates the affected machine and, above all, rotates all the credentials and tokens that could have been accessible from that computer (repository tokens, SSH keys, cloud service credentials, API keys and wallet keys). Socket has published the complete list of identified extensions and is the starting point for identifying affected facilities: Socket - 73 Open VSX sleeper extensions.
Beyond the immediate response, there are practical measures to mitigate this type of risk in the future: apply egress controls (output filtering) to block automatic downloads from unreliable URLs, avoid installing extensions from unverified repositories in production environments or CI, and use isolated environments (virtual machines or ephemeral containers) to test new extensions before incorporating them into the workflow. It is also advisable for organizations to implement secret management and automatic rotation policies, and to monitor the subscription and permissions of the accounts that publish extensions.
For operators and ecosystem maintainers such as OpenVSX and extension marketplaces, the case again highlights the need for more stringent mechanisms for publicators' verification and clone detection: signed packages, validation of the publisher ID and visual similarity detection should be minimum requirements, together with automated analysis that detects "sleeping" behaviors or discharge patterns in running time. You can check the OpenVSX platform for details and policies of the repository: OpenVSX.

From a compliance and risk perspective, campaigns such as GlassWorm require security teams to integrate the software supply chain review into the deployment processes: unit audits, device scanning and SBOMs (list of components) to detect unauthorized changes and reduce the exposure window. For general guidance on risk management in supply chains, CISA offers useful material that can help prioritize controls: CISA - Supply Chain Risk Management.
If you detect evidence of engagement, document and preserve logs and artifacts before cleaning the equipment, notify your security team and marketers (OpenVSX and, if appropriate, Socket equipment or equivalent platforms), and prepare for safe reconstruction of the environment (clean reinstallation and restoration from verified backups). Rapid containment and the rotation of secrets are the actions that most reduce damage in the short term.
GlassWorm is an example of how attackers are refining supply tactics: instead of directly introducing malware, they prefer to enter through the front door with benign artifacts and activate the malicious load later. For developers and security officials this requires a shift from a default confidence mentality to a continuous verification- check the publisher ID, monitor extension updates, limit permissions and automate the rotation of secrets are concrete steps that reduce the risk of becoming a victim of this or other similar campaigns.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...