Over 22,000 downloads
On January 30, 2026, the Open VSX Registry, an open-source alternative to the Visual Studio Code Marketplace, was targeted in a supply chain attack. According to security firm Socket, threat actors compromised the publishing credentials of a developer known as "oorzc" and used the access to inject malware into four established extensions. The malicious updates contained a malware loader dubbed GlassWorm. These extensions, trusted by the community and downloaded over 22,000 times, became an unwitting distribution vector for the malware. The incident highlights the growing trend of attackers targeting developer ecosystems and abusing trusted relationships to propagate malware. The Open VSX team has since removed the compromised extensions.
This attack is a clear example of a trusted dependency compromise. The attackers did not create new, suspicious extensions; instead, they hijacked existing, popular ones that had been available for over two years. By compromising the developer's account (T1078 - Valid Accounts), likely through a leaked publishing token or credential theft, the attackers were able to publish new versions of the extensions that appeared legitimate. Developers who had the extensions installed would have received the malicious update automatically through their IDE's standard update process. The embedded GlassWorm malware is described as a loader, meaning its primary purpose is to gain an initial foothold on the developer's machine and then download and execute additional, more damaging payloads.
The attack leveraged the trust inherent in the package manager ecosystem.
T1078 - Valid Accounts.T1195.002 - Compromise Software Supply Chain, specifically by compromising a software development tool.post-install scripts or by modifying the extension's core JavaScript files (T1059.007 - JavaScript).The impact of this attack is twofold. First, the more than 22,000 developers who downloaded the compromised extensions are at risk. A compromised developer machine is a highly valuable target, as it can be used to inject malicious code into the software that developer produces, creating a cascading supply chain catastrophe. Second, the incident damages trust in the Open VSX ecosystem and open-source registries in general. Users must now be more vigilant about the extensions they install and the updates they receive. The potential for data theft (source code, credentials, private keys) from infected developers is extremely high.
Code.exe). Look for anomalous behavior, such as unexpected network connections, file system activity outside of the project workspace, or the execution of shell commands.M1032 - Multi-factor Authentication). This is the most effective way to prevent account takeovers via credential theft.New analysis provides a detailed attack flow, additional MITRE ATT&CK and D3FEND techniques, and expanded impact assessment for the GlassWorm supply chain attack.
Further analysis of the Open VSX supply chain attack reveals a more detailed attack flow, including the likely method of credential compromise (T1552.001 - Credentials in Files) and the loader's function for ingress tool transfer (T1105). The report also incorporates D3FEND techniques for behavioral process analysis (D3-BPA) and multi-factor authentication (D3-MFA) in detection and mitigation. The impact assessment is expanded, highlighting the high value of compromised developer machines for stealing source code, propagating further supply chain attacks, accessing credentials, and corporate espionage. Mitigation strategies are also more thoroughly detailed, including the use of secret management tools and extension pinning.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats