Signal
GlassWorm distributed via hijacked open VSX publisher and malicious VS code extensions
Evidence first: scan the strongest sources, then decide whether to go deeper.
Published 2026-02-02 05:04 UTCUpdated 2026-02-02 22:04 UTC
rss
malwaresupply_chaindeveloper_toolscredential_theftmacos
Source links open
Source links and full evidence are open here. Archive history, compare-over-time, alerts, exports, API, integrations, and workflow are paid.
No card needed for the free brief.
Evidence trail (top sources)
top sources (2 domains)domains are deduped. counts indicate coverage, not truth.2 top sources shown
limited source diversity in top sources
Overview
Reporting indicates a supply-chain style malware distribution attempt targeting developers: a publisher account on Open VSX was hijacked and used to push malicious updates to established VS Code extensions, delivering a GlassWorm loader and ultimately aiming at macOS systems to steal sensitive data such as passwords, crypto-wallet information, and developer credentials/configurations.
Entities
SecurityWeekOpen VSXGlassWormVS CodeOpenVSX
Score total
1
Momentum 24h
2
Posts
2
Origins
2
Source types
1
Duplicate ratio
0%
Why now
- Fresh reporting links GlassWorm distribution to Open VSX publisher account hijacking.
- Malicious updates were published to established VS Code extensions, increasing exposure risk.
- The campaign is described as actively targeting macOS for credential and wallet theft.
Why it matters
- Compromised extension ecosystems can turn routine updates into malware delivery.
- Targeted theft includes developer credentials/configs, which can cascade into wider compromise.
- macOS developer environments are explicitly in scope of the reported campaign.
LLM analysis
Topic mix: lowPromo risk: lowSource quality: high
Recurring claims
- A hijacked Open VSX publisher account was used to publish malicious versions of established VS Code extensions to distribute a GlassWorm malware loader.
- The GlassWorm campaign targeting macOS aims to steal passwords, crypto-wallet data, and developer credentials/configurations via compromised OpenVSX extensions.
How sources frame it
- SecurityWeek: neutral
- BleepingComputer: neutral
All evidence
All evidence
New GlassWorm attack targets macOS via compromised OpenVSX extensions
BleepingComputer · bleepingcomputer.com · 2026-02-02 22:04 UTC
Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack
SecurityWeek · securityweek.com · 2026-02-02 14:12 UTC
Show filters & breakdown
Posts loaded: 0Publishers: 2Origin domains: 2Duplicates: -
Showing 2 / 0
Top publishers (this list)
- BleepingComputer (1)
- SecurityWeek (1)
Top origin domains (this list)
- bleepingcomputer.com (1)
- securityweek.com (1)