Signal

GlassWorm distributed via hijacked open VSX publisher and malicious VS code extensions

Evidence first: scan the strongest sources, then decide whether to go deeper.

Published 2026-02-02 05:04 UTCUpdated 2026-02-02 22:04 UTC
rss
malwaresupply_chaindeveloper_toolscredential_theftmacos
Source links open
Source links and full evidence are open here. Archive history, compare-over-time, alerts, exports, API, integrations, and workflow are paid.
No card needed for the free brief.
Evidence trail (top sources)
top sources (2 domains)domains are deduped. counts indicate coverage, not truth.
2 top sources shown
limited source diversity in top sources
Overview

Reporting indicates a supply-chain style malware distribution attempt targeting developers: a publisher account on Open VSX was hijacked and used to push malicious updates to established VS Code extensions, delivering a GlassWorm loader and ultimately aiming at macOS systems to steal sensitive data such as passwords, crypto-wallet information, and developer credentials/configurations.

Entities
SecurityWeekOpen VSXGlassWormVS CodeOpenVSX
Score total
1
Momentum 24h
2
Posts
2
Origins
2
Source types
1
Duplicate ratio
0%
Why now
  • Fresh reporting links GlassWorm distribution to Open VSX publisher account hijacking.
  • Malicious updates were published to established VS Code extensions, increasing exposure risk.
  • The campaign is described as actively targeting macOS for credential and wallet theft.
Why it matters
  • Compromised extension ecosystems can turn routine updates into malware delivery.
  • Targeted theft includes developer credentials/configs, which can cascade into wider compromise.
  • macOS developer environments are explicitly in scope of the reported campaign.
LLM analysis
Topic mix: lowPromo risk: lowSource quality: high
Recurring claims
  • A hijacked Open VSX publisher account was used to publish malicious versions of established VS Code extensions to distribute a GlassWorm malware loader.
  • The GlassWorm campaign targeting macOS aims to steal passwords, crypto-wallet data, and developer credentials/configurations via compromised OpenVSX extensions.
How sources frame it
  • SecurityWeek: neutral
  • BleepingComputer: neutral
All evidence
All evidence
New GlassWorm attack targets macOS via compromised OpenVSX extensions
BleepingComputer · bleepingcomputer.com · 2026-02-02 22:04 UTC
Open VSX Publisher Account Hijacked in Fresh GlassWorm Attack
SecurityWeek · securityweek.com · 2026-02-02 14:12 UTC
Show filters & breakdown
Posts loaded: 0Publishers: 2Origin domains: 2Duplicates: -
Showing 2 / 0
Top publishers (this list)
  • BleepingComputer (1)
  • SecurityWeek (1)
Top origin domains (this list)
  • bleepingcomputer.com (1)
  • securityweek.com (1)