Open VSX Marketplace Hit by Supply Chain Attack Spreading "GlassWorm" Malware

Compromised Developer Account Used to Inject GlassWorm Malware into Popular Open VSX Extensions

HIGH
February 2, 2026
4m read
Supply Chain AttackMalwareCloud Security

Impact Scope

People Affected

Over 22,000 downloads

Industries Affected

Technology

Related Entities

Organizations

Socket

Products & Tech

Open VSX Registry Visual Studio Code

Other

GlassWormoorzc

Full Report

Executive Summary

On January 30, 2026, the Open VSX Registry, an open-source alternative to the Visual Studio Code Marketplace, was targeted in a supply chain attack. According to security firm Socket, threat actors compromised the publishing credentials of a developer known as "oorzc" and used the access to inject malware into four established extensions. The malicious updates contained a malware loader dubbed GlassWorm. These extensions, trusted by the community and downloaded over 22,000 times, became an unwitting distribution vector for the malware. The incident highlights the growing trend of attackers targeting developer ecosystems and abusing trusted relationships to propagate malware. The Open VSX team has since removed the compromised extensions.

Threat Overview

This attack is a clear example of a trusted dependency compromise. The attackers did not create new, suspicious extensions; instead, they hijacked existing, popular ones that had been available for over two years. By compromising the developer's account (T1078 - Valid Accounts), likely through a leaked publishing token or credential theft, the attackers were able to publish new versions of the extensions that appeared legitimate. Developers who had the extensions installed would have received the malicious update automatically through their IDE's standard update process. The embedded GlassWorm malware is described as a loader, meaning its primary purpose is to gain an initial foothold on the developer's machine and then download and execute additional, more damaging payloads.

Technical Analysis

The attack leveraged the trust inherent in the package manager ecosystem.

  1. Initial Access (to developer account): The threat actor gained access to the 'oorzc' developer account. This likely involved techniques such as phishing, credential stuffing, or finding a leaked API token/credential, which falls under T1078 - Valid Accounts.
  2. Compromise Software Supply Chain: The attacker then published malicious versions of legitimate software. This is a direct example of T1195.002 - Compromise Software Supply Chain, specifically by compromising a software development tool.
  3. Execution: When a developer's VS Code instance automatically updated the compromised extension, the malicious code, including the GlassWorm loader, would be executed within the context of the IDE. This could be achieved via post-install scripts or by modifying the extension's core JavaScript files (T1059.007 - JavaScript).

Impact Assessment

The impact of this attack is twofold. First, the more than 22,000 developers who downloaded the compromised extensions are at risk. A compromised developer machine is a highly valuable target, as it can be used to inject malicious code into the software that developer produces, creating a cascading supply chain catastrophe. Second, the incident damages trust in the Open VSX ecosystem and open-source registries in general. Users must now be more vigilant about the extensions they install and the updates they receive. The potential for data theft (source code, credentials, private keys) from infected developers is extremely high.

Detection & Response

  1. Audit Extensions: Developers using VS Code (especially with the Open VSX registry) should immediately review their list of installed extensions. Check for the four compromised extensions from developer 'oorzc' and uninstall them. The Open VSX team has removed the malicious versions, but local copies may persist.
  2. Scan for IOCs: Security teams should scan developer workstations for IOCs related to GlassWorm. While not publicly available yet, this would include file hashes, C2 domains, and specific registry keys or file paths used for persistence.
  3. Credential Rotation: Any developer who had the malicious extensions installed should consider their machine compromised and immediately rotate all credentials stored on or accessed from that machine. This includes Git tokens, SSH keys, cloud provider API keys, and password manager master passwords.
  4. Monitor IDE Processes: Use an EDR to monitor processes spawned by VS Code (Code.exe). Look for anomalous behavior, such as unexpected network connections, file system activity outside of the project workspace, or the execution of shell commands.

Mitigation

  1. Enforce MFA on Developer Accounts: All developer accounts on platforms like GitHub, GitLab, and package registries like Open VSX must be protected with strong multi-factor authentication (M1032 - Multi-factor Authentication). This is the most effective way to prevent account takeovers via credential theft.
  2. Use Scoped, Short-Lived Tokens: Developers should use publishing tokens that are narrowly scoped to specific packages and have short expiration dates. This limits the window of opportunity for an attacker if a token is leaked.
  3. Vet Dependencies: Before installing a new extension or dependency, perform basic vetting. Check its download count, reviews, and the publisher's history. Utilize tools that can scan dependencies for known vulnerabilities or malicious code.
  4. Principle of Least Privilege: Run development tools with the lowest possible user privileges. Avoid running VS Code as an administrator, as this would give a compromised extension full control over the system.

Timeline of Events

1
January 30, 2026
Malicious updates containing GlassWorm malware were pushed to the Open VSX Registry.
2
February 2, 2026
This article was published

MITRE ATT&CK Mitigations

Enforce MFA on all developer accounts for code repositories and package registries to prevent account takeover.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Regularly audit installed software and dependencies on developer workstations to identify unauthorized or malicious components.

Mapped D3FEND Techniques:

Use security policies to restrict the execution of unauthorized scripts or binaries, potentially limiting the impact of a compromised extension.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To prevent attacks like the one on the Open VSX Registry, it is imperative that all developer-facing platforms, including code repositories (GitHub, GitLab) and package registries (NPM, PyPI, Open VSX), mandate the use of Multi-factor Authentication (MFA) for all accounts, especially those with publishing rights. This single control would have likely prevented the initial account takeover of the 'oorzc' developer. Organizations should enforce this internally for their own developers through policy and technical controls. For individual developers, this is a critical personal security hygiene step. Using a hardware security key (FIDO2/WebAuthn) provides the strongest protection against phishing and credential theft, which are common vectors for compromising developer accounts.

Implement a dependency analysis pipeline that performs dynamic analysis (sandboxing) on new or updated packages before they are allowed into the local development environment. When a VS Code extension is updated, a security tool could fetch it and run it in an isolated sandbox to observe its behavior. If the extension attempts to make unexpected network connections, access sensitive files outside its scope (like ~/.ssh/ or ~/.aws/credentials), or execute shell commands, the update can be automatically blocked and flagged for security review. This moves detection from a reactive, post-compromise state to a proactive, preventative one, directly addressing the risk of malicious code being introduced through trusted update channels.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

supply chainVS Codedeveloper toolsmalware loaderOpen VSXGlassWorm

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading