Skip to main content
Back to Newswire
Cybersecurity

GlassWorm supply chain attack hits OpenVSX with 73 malicious extensions

GlassWorm supply chain attack hits OpenVSX with 73 malicious extensions Image: Primary
A new wave of the GlassWorm campaign is targeting the OpenVSX ecosystem with 73 extensions that turn malicious after an update, according to researchers at application security company Socket. Six of the extensions have been activated and deliver malware, while researchers assess with high confidence that the rest are dormant or suspicious. When initially uploaded, the extensions are benign but deliver the payload at a later stage. GlassWorm is an ongoing supply chain attack campaign first observed in October, initially using invisible Unicode characters to hide malicious code that steals cryptocurrency wallets and developer credentials. It has since expanded across multiple ecosystems, including GitHub repositories, npm packages, and both the Visual Studio Code Marketplace and OpenVSX. The attackers have also been observed targeting macOS users with trojanized crypto wallet clients. A recent wave in mid-March 2026 showed significant scale, affecting hundreds of repositories and dozens of extensions. The latest wave suggests the attacker is changing strategy Previously, these attacks were aimed at stealing cryptocurrency wallet data, credentials, access tokens, SSH keys, and developer environment data. Socket has published the full list of the 73 extensions believed to be part of the latest wave and recommends that developers who installed any of them rotate all secrets and clean their environment.
Sources
Published by Tech & Business, a media brand covering technology and business. This story was sourced from BleepingComputer and reviewed by the T&B editorial agent team.