Article Details

Scrape Timestamp (UTC): 2026-02-02 05:09:19.621

Source: https://thehackernews.com/2026/02/open-vsx-supply-chain-attack-used.html

Original Article Text

Click to Toggle View

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm. Cybersecurity researchers have disclosed details of a supply chain attack targeting the Open VSX Registry in which unidentified threat actors compromised a legitimate developer's resources to push malicious updates to downstream users. "On January 30, 2026, four established Open VSX extensions published by the oorzc author had malicious versions published to Open VSX that embed the GlassWorm malware loader," Socket security researcher Kirill Boychenko said in a Saturday report. "These extensions had previously been presented as legitimate developer utilities (some first published more than two years ago) and collectively accumulated over 22,000 Open VSX downloads prior to the malicious releases." The supply chain security company said that the supply chain attack involved the compromise of the developer's publishing credentials, with the Open VSX security team assessing the incident as involving the use of either a leaked token or other unauthorized access. The malicious versions have since been removed from the Open VSX. The list of identified extensions is below - The poisoned versions, Socket noted, are designed to deliver a loader malware associated with a known campaign called GlassWorm. The loader is equipped to decrypt and run embedded at runtime, uses an increasingly weaponized technique called EtherHiding to fetch command-and-control (C2) endpoints, and ultimately run code designed to steal Apple macOS credentials and cryptocurrency wallet data. At the same time, the malware is detonated only after the compromised machine has been profiled, and it has been determined that it does not correspond to a Russian locale, a pattern commonly observed in malicious programs originating from or affiliated with Russian-speaking threat actors to avoid domestic prosecution. The kinds of information harvested by the malware include - The targeting of developer information poses severe risks as it exposes enterprise environments to potential cloud account compromise and lateral movement attacks. "The payload includes routines to locate and extract authentication material used in common workflows, including inspecting npm configuration for _authToken and referencing GitHub authentication artifacts, which can provide access to private repositories, CI secrets, and release automation," Boychenko said. A significant aspect of the attack is that it diverges from previously observed GlassWorm indicators in that it makes use of a compromised account belonging to a legitimate developer to distribute the malware. In prior instances, the threat actors behind the campaign have leveraged typosquatting and brandjacking to upload fraudulent extensions for subsequent propagation. "The threat actor blends into normal developer workflows, hides execution behind encrypted, runtime-decrypted loaders, and uses Solana memos as a dynamic dead drop to rotate staging infrastructure without republishing extensions," Socket said. "These design choices reduce the value of static indicators and shift defender advantage toward behavioral detection and rapid response."

Daily Brief Summary

MISCELLANEOUS // Open VSX Registry Compromised to Distribute GlassWorm Malware

A supply chain attack targeted the Open VSX Registry, compromising a developer's account to distribute GlassWorm malware through legitimate extensions.

The attack affected four Open VSX extensions, previously downloaded over 22,000 times, embedding a malware loader to target downstream users.

Malicious versions were removed after the Open VSX security team identified potential unauthorized access via leaked tokens or credentials.

GlassWorm malware employs EtherHiding to access command-and-control servers, stealing macOS credentials and cryptocurrency wallet data while avoiding Russian locales.

The attack risks enterprise environments by potentially compromising cloud accounts and enabling lateral movement, exploiting authentication materials in developer workflows.

Unlike past GlassWorm campaigns using typosquatting, this attack leveraged a legitimate developer account, complicating detection and response efforts.

The threat actor's strategy of using encrypted, runtime-decrypted loaders and dynamic infrastructure rotation challenges static detection methods.