Article Details
Scrape Timestamp (UTC): 2026-02-02 22:12:50.432
Original Article Text
Click to Toggle View
New GlassWorm attack targets macOS via compromised OpenVSX extensions. A new GlassWorm malware attack through compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet data, and developer credentials and configurations from macOS systems. The threat actor gained access to the account of a legitimate developer (oorzc) and pushed malicious updates with the GlassWorm payload to four extensions that had been downloaded 22,000 times. GlassWorm attacks first appeared in late October, hiding the malicious code using “invisible” Unicode characters to steal cryptocurrency wallet and developer account details. The malware also supports VNC-based remote access and SOCKS proxying. Over time and across multiple attack waves, GlassWorm impacted both Microsoft’s official Visual Studio Code marketplace and its open-source alternative for unsupported IDEs, OpenVSX. In a previous campaign, GlassWorm showed signs of evolution, targeting macOS systems, and its developers were working to add a replacement mechanism for the Trezor and Ledger apps. A new report from Socket’s security team describes a new campaign that relied on trojanizing the following extensions: The malicious updates were pushed on January 30, and Socket reports that the extensions had been innocuous for two years. This suggests that the oorzc account was most likely compromised by GlassWorm operators. According to the researchers, the campaign targets macOS systems exclusively, pulling instructions from Solana transaction memos. Notably, Russian-locale systems are excluded, which may hint at the origin of the attacker. GlassWorm loads a macOS information stealer that establishes persistence on infected systems via a LaunchAgent, enabling execution at login. It harvests browser data across Firefox and Chromium, wallet extensions and wallet apps, macOS keychain data, Apple Notes databases, Safari cookies, developer secrets, and documents from the local filesystem, and exfiltrates everything to the attacker's infrastructure at 45.32.150[.]251. Socket reported the packages to the Eclipse Foundation, the operator of the Open VSX platform, and the security team confirmed unauthorized publishing access, revoked tokens, and removed the malicious releases. The only exception is oorzc.ssh-tools, which was removed completely from Open VSX due to discovering multiple malicious releases. Currently, versions of the affected extensions on the market are clean, but developers who downloaded the malicious releases should perform a full system clean-up and rotate all their secrets and passwords. The future of IT infrastructure is here Modern IT infrastructure moves faster than manual workflows can handle. In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.
Daily Brief Summary
GlassWorm malware has been detected infiltrating macOS systems via compromised OpenVSX extensions, focusing on stealing sensitive data, including passwords and crypto-wallet information.
The threat actor accessed a legitimate developer's account, oorzc, to distribute malicious updates across four extensions, impacting 22,000 downloads.
GlassWorm utilizes "invisible" Unicode characters to conceal its code, enabling it to steal cryptocurrency wallet and developer account details.
The malware facilitates VNC-based remote access and SOCKS proxying, establishing persistence through a LaunchAgent for execution at login.
The campaign specifically targets macOS systems, excluding Russian-locale systems, and exfiltrates data to an identified attacker infrastructure.
Socket's security team reported the breach to the Eclipse Foundation, leading to revoked tokens and removal of malicious releases from OpenVSX.
Developers affected by the malicious updates are advised to conduct a comprehensive system clean-up and rotate all credentials and passwords.