GlassWorm Malware Hits Open VSX via Developer Hack

Malicious extension updates hijack developer account, deliver GlassWorm malware to steal crypto and credentials

  • Threat actors compromised a legitimate developer’s account on the Open VSX Registry to publish malicious versions of four extensions.
  • The poisoned extensions delivered the GlassWorm malware loader, designed to steal cryptocurrency data and developer credentials.
  • The malware specifically avoided infecting machines with a Russian locale, a common evasion tactic.
  • Over 22,000 downloads had been recorded for the now-compromised extensions prior to the attack.

On February 2, 2026, cybersecurity researchers revealed a significant supply chain attack that compromised the popular Open VSX Registry. Unidentified threat actors hijacked a legitimate developer’s account to push malicious updates to widely used developer tool extensions. According to a report by Socket security researcher Kirill Boychenko, these poisoned versions delivered a dangerous malware loader.

- Advertisement -

The attack specifically targeted four extensions published under the account “oorzc,” including FTP/SFTP/SSH Sync Tool and vscode mindmap. These extensions had accumulated more than 22,000 downloads before the malicious releases were published. The Open VSX security team assessed that the developer’s publishing credentials were compromised, possibly through a leaked token.

Consequently, the malicious updates delivered a payload associated with the known GlassWorm campaign. This malware used an EtherHiding technique to fetch command-and-control servers. It was also programmed to profile a victim’s machine and avoid execution if a Russian locale was detected.

Meanwhile, the malware’s primary function was to steal sensitive information for financial gain. Its targets included data from Firefox and Chromium-based browsers, such as login credentials and cryptocurrency wallet extensions like MetaMask. It also hunted for specific cryptocurrency wallet files from Electrum, Exodus, Ledger Live, and Trezor Suite.

The malware further sought developer credentials from directories like `~/.aws` and `~/.ssh`. Boychenko noted, “The payload includes routines to locate and extract authentication material used in common workflows.” This data theft posed severe risks for lateral movement within enterprise environments.

- Advertisement -

However, this incident marked a tactical shift in the GlassWorm campaign’s methods. Instead of using typosquatting, the actors leveraged a legitimate, compromised developer account. Socket said this approach allowed the threat actor to blend into normal workflows and hide behind encrypted loaders.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Tesla Shares Dip as Europe Registrations Plunge

Tesla's new vehicle registrations plummeted 42% in France and 88% in Norway for January...

MicroStrategy Buys $75M in BTC as Stock Falls

MicroStrategy added 855 Bitcoin last week, a smaller-than-usual purchase funded by selling common stock.The...

JP Morgan’s Silver Crash Prediction Nearly Accurate After 30% Drop

JP Morgan predicted a 50% silver price crash one day before a historic 30%...

Binance Adds $100M Bitcoin to SAFU Amid Price Drop

Binance purchased 1,315 Bitcoin for its SAFU insurance fund for the first time in...

India’s Harsh Crypto Tax Regime Unchanged in Budget 2026

India's Finance Minister left the country's punitive crypto tax regime, including a 30% flat...
- Advertisement -

Must Read

12 Hosting Providers To Buy VPS With Bitcoin: An Expert Guide for 2026

You need a VPS. You want to pay with Bitcoin. Simple enough, right?Not quite. The market for crypto VPS = VPS hosting that accepts...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!