Over 22,000 downloads
On January 30, 2026, the Open VSX Registry, an open-source alternative to the Visual Studio Code Marketplace, was targeted in a supply chain attack. According to security firm Socket, threat actors compromised the publishing credentials of a developer known as "oorzc" and used the access to inject malware into four established extensions. The malicious updates contained a malware loader dubbed GlassWorm. These extensions, trusted by the community and downloaded over 22,000 times, became an unwitting distribution vector for the malware. The incident highlights the growing trend of attackers targeting developer ecosystems and abusing trusted relationships to propagate malware. The Open VSX team has since removed the compromised extensions.
This attack is a clear example of a trusted dependency compromise. The attackers did not create new, suspicious extensions; instead, they hijacked existing, popular ones that had been available for over two years. By compromising the developer's account (T1078 - Valid Accounts), likely through a leaked publishing token or credential theft, the attackers were able to publish new versions of the extensions that appeared legitimate. Developers who had the extensions installed would have received the malicious update automatically through their IDE's standard update process. The embedded GlassWorm malware is described as a loader, meaning its primary purpose is to gain an initial foothold on the developer's machine and then download and execute additional, more damaging payloads.
The attack leveraged the trust inherent in the package manager ecosystem.
T1078 - Valid Accounts.T1195.002 - Compromise Software Supply Chain, specifically by compromising a software development tool.post-install scripts or by modifying the extension's core JavaScript files (T1059.007 - JavaScript).The impact of this attack is twofold. First, the more than 22,000 developers who downloaded the compromised extensions are at risk. A compromised developer machine is a highly valuable target, as it can be used to inject malicious code into the software that developer produces, creating a cascading supply chain catastrophe. Second, the incident damages trust in the Open VSX ecosystem and open-source registries in general. Users must now be more vigilant about the extensions they install and the updates they receive. The potential for data theft (source code, credentials, private keys) from infected developers is extremely high.
Code.exe). Look for anomalous behavior, such as unexpected network connections, file system activity outside of the project workspace, or the execution of shell commands.M1032 - Multi-factor Authentication). This is the most effective way to prevent account takeovers via credential theft.Enforce MFA on all developer accounts for code repositories and package registries to prevent account takeover.
Mapped D3FEND Techniques:
Regularly audit installed software and dependencies on developer workstations to identify unauthorized or malicious components.
Use security policies to restrict the execution of unauthorized scripts or binaries, potentially limiting the impact of a compromised extension.
Mapped D3FEND Techniques:
To prevent attacks like the one on the Open VSX Registry, it is imperative that all developer-facing platforms, including code repositories (GitHub, GitLab) and package registries (NPM, PyPI, Open VSX), mandate the use of Multi-factor Authentication (MFA) for all accounts, especially those with publishing rights. This single control would have likely prevented the initial account takeover of the 'oorzc' developer. Organizations should enforce this internally for their own developers through policy and technical controls. For individual developers, this is a critical personal security hygiene step. Using a hardware security key (FIDO2/WebAuthn) provides the strongest protection against phishing and credential theft, which are common vectors for compromising developer accounts.
Implement a dependency analysis pipeline that performs dynamic analysis (sandboxing) on new or updated packages before they are allowed into the local development environment. When a VS Code extension is updated, a security tool could fetch it and run it in an isolated sandbox to observe its behavior. If the extension attempts to make unexpected network connections, access sensitive files outside its scope (like ~/.ssh/ or ~/.aws/credentials), or execute shell commands, the update can be automatically blocked and flagged for security review. This moves detection from a reactive, post-compromise state to a proactive, preventative one, directly addressing the risk of malicious code being introduced through trusted update channels.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats