:

GLASSWORM MALWARE RETURNS WITH 73 HIDDEN EXTENSIONS

SECURITY DESK2 MIN READ
MON, APR 27, 2026

■ AI-SUMMARIZED FROM 1 SOURCE BELOW

The GlassWorm campaign has resurfaced with 73 malicious "sleeper" extensions in the OpenVSX marketplace. These extensions remain dormant until activated through updates, creating a delayed-attack vector.

Security researchers have identified a renewed GlassWorm malware campaign targeting the OpenVSX ecosystem with 73 infected extensions designed to evade immediate detection. The attack uses a "sleeper" mechanism where extensions appear benign upon installation but become malicious following an update. This delay tactic complicates detection and allows the malware to establish a foothold before activating its payload. OpenVSX is an open-source registry for Visual Studio Code extensions. The platform's decentralized model, while offering community benefits, creates security challenges for vetting submissions. Researchers discovered the malicious extensions had been uploaded to the repository and were available for download. The GlassWorm campaign is not new. Previous iterations have targeted package repositories and developer tools. This latest variant demonstrates persistent efforts to compromise developer environments—high-value targets due to access to source code and deployment credentials. Affected users should audit recently installed extensions and review update histories. OpenVSX maintainers have been notified and have removed the identified malicious extensions from the repository. The incident highlights broader supply-chain security concerns in software development. Attackers increasingly target repositories and package managers as entry points, recognizing that compromised developer tools can affect downstream users and organizations. Developers are advised to review extensions for suspicious behavior, verify extension sources, and consider using only officially maintained or widely-trusted extensions. Organizations should implement code review processes and monitor extension activity within development environments. OpenVSX users can check their installed extensions against published lists of affected packages. Those who installed any of the 73 malicious extensions should remove them immediately and monitor systems for unauthorized activity.

■ SOURCES

Bleeping Computer

■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE

■ MORE FROM THE SECURITY DESK

Element-data, an open source package downloaded 1 million times monthly, was found stealing user credentials. Users of the library should immediately check for signs of compromise.

JUST NOWDev Desk

A Chinese national accused of conducting cyberespionage for China's intelligence services has been extradited from Italy to face criminal charges in the United States.

1H AGOSecurity Desk

Singapore's Land Transport Authority has suspended a government construction contractor's access to its digital systems following a cybersecurity incident involving the company.

1H AGOSecurity Desk

The US Supreme Court is reviewing whether law enforcement can use cell location data to track suspects without a warrant. The case raises fundamental questions about privacy rights in the digital age.

2H AGOIndustry Desk

■ SUBSCRIBE TO THE DAILY BRIEF

ONE EMAIL, 5 STORIES, 06:00 UTC. UNSUBSCRIBE ANYTIME.