Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»GlassWorm malware attacks return via 73 OpenVSX “sleeper” extensions
    Cybersecurity

    GlassWorm malware attacks return via 73 OpenVSX “sleeper” extensions

    adminBy adminApril 28, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    GlassWorm malware attacks return via 73 OpenVSX
    Share
    Facebook Twitter LinkedIn Pinterest Email

    GlassWorm malware attacks return via 73 OpenVSX

    A new wave of the Glassworm campaign is targeting the OpenVSX ecosystem with 73 “sleeper” extensions that turn malicious after an update.

    Six of the extensions have been activated and deliver malware, while researchers assess with high confidence that the rest of them are dormant or at least suspicious.

    When initially uploaded, the extensions are benign but deliver the payload at a later stage, revealing the attacker’s true intention.

    image

    “This count may change as new updates continue to appear, but the pattern is consistent with earlier GlassWorm waves,” say researchers at application security company Socket.

    GlassWorm is an ongoing supply chain attack campaign first observed in October, initially using invisible Unicode characters to hide malicious code that steals cryptocurrency wallets and developer credentials.

    It has since expanded across multiple ecosystems, including GitHub repositories, npm packages, and both the Visual Studio Code Marketplace and OpenVSX. They have also been observed to target macOS users with trojanized crypto wallet clients.

    A recent wave in mid-March 2026 showed significant scale, affecting hundreds of repositories and dozens of extensions.

    However, operations of such a scale can be noisy and leave multiple traces, as multiple distinct research teams caught the activity early and helped block it.

    The latest wave suggests that the attacker’s intent is to change their strategy by submitting innocuous extensions to a single ecosystem and introducing the malicious payload in a subsequent update, rather than embedding it in the extensions.

    Socket has found that the 73 extensions involved in the most recent GlassWorm campaign are clones of legitimate listings, designed to trick developers who do not pay much attention beyond visuals.

    In one case, the attacker used the same icon as the legitimate extension, adopted a similar naming and description. Although there are subtle differences, the main indicators are the name of the publisher and the unique identifier.

    Instead of carrying the malware, the extensions now act as thin loaders that fetch it via one of the following methods:

    • The extension retrieves a secondary VSIX package from GitHub at runtime and installs it using CLI commands.
    • The extensions load platform-specific compiled modules (.node files) that contain the core logic, including fetching additional payloads and executing installation routines across supported editors.
    • Some variants rely entirely on heavily obfuscated JavaScript that decodes at runtime to fetch and install malicious extensions, sometimes including encrypted or fallback URLs for payload retrieval.

    Socket did not provide technical details about the newest payload. Previously, these attacks were aimed at stealing cryptocurrency wallet data, credentials, access tokens, SSH keys, and developer environment data.

    The cybersecurity company has published the full list of the 73 extensions believed to be part of the latest GlassWorm wave. Developers who installed any of them are recommended to rotate all secrets and clean their environment.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot

    attacks Extensions GlassWorm Malware OpenVSX return sleeper
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow to Turn Webinars Into Your Best Lead Gen Channel in 5 Phases
    Next Article 77% use AI to shop. Nearly 1 in 3 won’t let it spend.
    admin
    • Website

    Related Posts

    Parsing Agentic Offensive Security’s Existential Threat

    April 28, 2026

    Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover

    April 28, 2026

    Energy and Water Management Firm Itron Hacked

    April 28, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Parsing Agentic Offensive Security’s Existential Threat

    April 28, 2026

    Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover

    April 28, 2026

    77% use AI to shop. Nearly 1 in 3 won’t let it spend.

    April 28, 2026

    GlassWorm malware attacks return via 73 OpenVSX “sleeper” extensions

    April 28, 2026
    Categories
    • Blogging (69)
    • Cybersecurity (1,550)
    • Privacy & Online Earning (186)
    • SEO & Digital Marketing (948)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (247)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Parsing Agentic Offensive Security’s Existential Threat

    April 28, 2026

    Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover

    April 28, 2026

    77% use AI to shop. Nearly 1 in 3 won’t let it spend.

    April 28, 2026
    Most Popular
    • Parsing Agentic Offensive Security’s Existential Threat
    • Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover
    • 77% use AI to shop. Nearly 1 in 3 won’t let it spend.
    • GlassWorm malware attacks return via 73 OpenVSX “sleeper” extensions
    • How to Turn Webinars Into Your Best Lead Gen Channel in 5 Phases
    • Energy and Water Management Firm Itron Hacked
    • How to Optimize Content for ChatGPT: An AI Discovery Guide
    • 20-Year-Old Malware Rewrites History of Cyber Sabotage
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.