GlassWorm Actively Targeting Open VSX
Most people think of cyberattacks as something that happens when someone clicks the wrong link in an email or visits a shady website. The latest GlassWorm malware campaign tells a very different story. In this case, attackers did not trick users directly.
Instead, they hid malicious software inside tools that developers already trusted and used every day. By doing so, they turned a respected software marketplace called Open VSX into an invisible delivery system for malware.

GlassWorm's most recent return shows how cybercrime has evolved. Attackers no longer rely on obvious scams or poorly disguised downloads. They now focus on quietly abusing trust, especially trust built into the tools that power modern software development. This campaign did not just infect individual computers. It revealed how weaknesses in trusted digital ecosystems can put thousands of people at risk at once.
Open VSX is an online marketplace where developers download extensions for Visual Studio Code, one of the world's most popular coding tools. These extensions add helpful features, such as code formatting, cloud service integration, and project management.
Open VSX is widely seen as a safe, open-source alternative to Microsoft's official extension store and is backed by a well-known nonprofit foundation. Because of this reputation, many developers install extensions from Open VSX without hesitation. Updates often happen automatically. That convenience is part of what makes the platform useful, and also what made it attractive to attackers.
In the most recent GlassWorm campaign, detailed by researchers at Socket.io, attackers did not upload obviously fake extensions. Instead, they took over a real developer account and secretly modified existing, trusted extensions. These extensions had already been used safely for a long time. Once infected, they quietly delivered malware to users who updated them, often without realizing anything had changed.
GlassWorm spreads by hiding inside legitimate software updates. When a developer installed or updated one of the compromised extensions, malicious code ran in the background. Nothing looked unusual on the surface. The extension still appeared to work as expected.
Behind the scenes, however, GlassWorm began collecting sensitive information from the infected computer. The attackers designed the malware to activate slowly and quietly, avoiding detection by common security tools.
The malware targeted macOS systems, which are widely used by developers. Once active, GlassWorm searched for valuable data, such as saved passwords, login tokens, and cryptocurrency wallets.
What made this campaign stand out was not just the malware itself, but how it entered systems. GlassWorm succeeded because it abused normal behavior. Developers trusted Open VSX. They trusted the extension author. They trusted the update process.
From a cybersecurity perspective, this attack broke several common assumptions:
- Trusted marketplaces can still distribute harmful software
- Popular tools can become attack channels without warning
- Automatic updates can introduce risk instead of reducing it
As the malware arrived through routine updates, many users never suspected a problem. That delay gave attackers more time to steal data and move on before they were discovered.
After installation, GlassWorm behaved like a digital burglar who already knew where to look. It searched for information that could be reused for future attacks or financial gain. This included access credentials, developer secrets, and cryptocurrency wallets.
In some cases, GlassWorm replaced legitimate crypto wallet software with modified versions designed to divert funds. In others, it focused on stealing login credentials to access cloud services or software repositories.
To make detection harder, the malware avoided obvious warning signs. It waited before acting and used encrypted communication methods that blended in with normal internet traffic.
Glassworm's Scary Persistence Mechanisms
Even after Open VSX removed the infected extensions, GlassWorm returned multiple times with new versions. This repetition showed that the attackers were not just experimenting. They were running a sustained campaign.
Each new wave adjusted techniques slightly to stay hidden longer. That persistence exposed a deeper issue. Removing bad software from a marketplace does not automatically clean infected computers. Once malware runs locally, the damage can continue long after the original source disappears. This gap between platform cleanup and user recovery remains one of the hardest problems in cybersecurity.
The Open VSX team responded quickly once researchers reported the issue. They removed the compromised extensions and shut down the affected developer account. These steps prevented further spread through the registry.
However, registry operators face a major limitation. They cannot access users' computers to remove malware. Anyone who had already installed the infected extensions needed to take action themselves, such as scanning their system and changing passwords. This reality highlights why prevention matters more than reaction when it comes to supply chain attacks.
GlassWorm did not aim at random users. It targeted developers because their computers often have access to powerful systems. A single compromised developer machine can expose source code, cloud environments, and production systems.
By attacking developers through their tools, GlassWorm aimed for higher-value outcomes. This strategy reflects a broader trend in cybercrime: attackers increasingly target the people who build and maintain digital infrastructure rather than end users.
Even for people who do not write code, this campaign matters. Many everyday apps and services depend on developer tools and open-source components. When those tools are compromised, the risk can ripple outward into products used by millions.
The GlassWorm campaign shows that cybersecurity problems often start far upstream, long before an app reaches the public. The Open VSX GlassWorm incident offers clear lessons for anyone interested in cybersecurity:
- Trust should always be verified, even for familiar tools
- Convenience features like automatic updates carry hidden risks
- Cybersecurity failures often stem from human trust, not technical flaws
These lessons apply not only to developers, but to anyone who relies on digital ecosystems built on shared components and third-party services. GlassWorm did not break into systems through brute-force attacks. It walked through trusted doors. By compromising a developer account and abusing a respected marketplace, attackers showed how fragile digital trust can be.
For cybersecurity leaders, this campaign serves as a warning. Protecting systems today means securing not just networks and devices, but also the tools people rely on to do their work. Marketplaces like Open VSX are no longer just distribution platforms. They are part of the global security perimeter. Until the industry treats developer tools with the same caution as production systems, campaigns like GlassWorm will continue to succeed, quietly, efficiently, and at scale.
Share:
Karolis Liucveikis
Experienced software engineer, passionate about behavioral analysis of malicious apps
Author and general operator of PCrisk's News and Removal Guides section. Co-researcher working alongside Tomas to discover the latest threats and global trends in the cyber security world. Karolis has experience of over 8 years working in this branch. He attended Kaunas University of Technology and graduated with a degree in Software Development in 2017. Extremely passionate about technical aspects and behavior of various malicious applications.
PCrisk security portal is brought by a company RCS LT.
Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.
Our malware removal guides are free. However, if you want to support us you can send us a donation.
DonatePCrisk security portal is brought by a company RCS LT.
Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.
Our malware removal guides are free. However, if you want to support us you can send us a donation.
Donate
▼ Show Discussion