73 Open VSX Sleeper Extensions Linked to GlassWorm Activate New Malware Campaign
Cybersecurity NewsArchived Apr 26, 2026✓ Full text saved
The GlassWorm supply chain attack targeting the Open VSX marketplace has escalated with the discovery of 73 new “sleeper” extensions. Identified in April 2026, this cluster marks a dangerous shift in how threat actors distribute malware to software developers. This activity follows a major wave discovered in March 2026, where researchers documented 72 malicious Open […] The post 73 Open VSX Sleeper Extensions Linked to GlassWorm Activate New Malware Campaign appeared first on Cyber Security News
Full text archived locally
✦ AI Summary· Claude Sonnet
HomeCyber Security News
73 Open VSX Sleeper Extensions Linked to GlassWorm Activate New Malware Campaign
By Abinaya
April 26, 2026
The GlassWorm supply chain attack targeting the Open VSX marketplace has escalated with the discovery of 73 new “sleeper” extensions.
Identified in April 2026, this cluster marks a dangerous shift in how threat actors distribute malware to software developers.
This activity follows a major wave discovered in March 2026, where researchers documented 72 malicious Open VSX extensions tied to the GlassWorm operation.
Earlier variants abused extension dependency features to install malicious loaders silently. However, the new April 2026 cluster shows that attackers are evolving their tactics to evade security scans.
The Sleeper Extension Strategy
A sleeper extension is a fake package published by threat actors before it is weaponized. These extensions initially appear harmless to build visual trust, gain credibility, and gather downloads.
Attackers use newly created GitHub accounts to publish cloned versions of popular tools.
For example, attackers created a fake Turkish Language Pack for Visual Studio Code that closely mimicked the legitimate version. They copied the globe icon and the description, while simply swapping the publisher name.
A fake Turkish language pack for Visual Studio Code(source :socket)
Once developers install these cloned tools, the attackers wait before pushing a software update that delivers the malware. At least six of the 73 new extensions have already been activated to deliver payloads.
Evolving Delivery Mechanisms
In this latest wave, the extension acts only as a thin loader to fetch external payloads.
The malicious code is no longer directly visible in the extension’s source code, increasing the likelihood of evading detection.
The campaign uses two primary execution methods:
Native Binaries: Bundled .node files are hidden inside the extension code. A simple JavaScript file runs the binary, which contains embedded URLs that download malicious .vsix files for IDEs such as VS Code and Cursor.
Obfuscated JavaScript: The malicious logic is heavily obfuscated and does not rely on bundled binary files. The code decodes itself at runtime, retrieves a malicious .vsix payload from a GitHub release, and installs it through command-line paths.
Indicators of Compromise
Security teams should monitor for the following indicators:
Native Installer Binaries (SHA256): 1b62b7c2ed7cc296ce821f977ef7b22bae59ef1dcdb9a34ae19467ee39bcf168.
Downloaded VSIX Payload (SHA256): 97c275e3406ad6576529f41604ad138c5bdc4297d195bf61b049e14f6b30adfd.
Malicious GitHub Hosting: github[.]com/SquadMagistrate10/wnxtgkih.
Confirmed Malicious Extensions: outsidestormcommand. monochromator-theme, boulderzitunnel. vscode-buddies.
According to Socket Research Team, developers must verify publisher namespaces and inspect download counts carefully before installing extensions from the Open VSX marketplace.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
Tags
cyber security
cyber security news
Copy URL
Linkedin
Twitter
ReddIt
Telegram
Abinayahttps://cybersecuritynews.com/
Abi is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.
Trending News
Hackers Abuse GitHub Issue Notifications to Phish Developers Through Malicious OAuth Apps
Hackers Abuse Compromised Routers to Hide China-Linked Cyber Operations
Hackers Abuse Fake Wallpaper App and YouTube Channel to Spread notnullOSX Malware
NIST Shifts to Risk-Based NVD Model as CVE Submissions Surge 263% Since 2020
Lovable AI App Builder Reportedly Exposes Thousands of Projects Data via API Flaw
Latest News
Cyber Security
New Windows RPC Vulnerability Lets Attackers Escalate Privileges Across All Windows Versions
Cyber Security News
CISA Warns of Multiple SimpleHelp Vulnerabilities Exploited in Attack
Cyber Security News
Claude AI Agents Close 186 Deals in Anthropic’s Marketplace Experiment
Bug Bounty
GPT‑5.5 Bio Bug Bounty to Strengthen Advanced AI Capabilities
Cyber Security News
Hackers Can Abuse Entra Agent ID Administrator Role to Hijack Service Principals