CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 26, 2026

73 Open VSX Sleeper Extensions Linked to GlassWorm Activate New Malware Campaign

Cybersecurity News Archived Apr 26, 2026 ✓ Full text saved

The GlassWorm supply chain attack targeting the Open VSX marketplace has escalated with the discovery of 73 new “sleeper” extensions. Identified in April 2026, this cluster marks a dangerous shift in how threat actors distribute malware to software developers. This activity follows a major wave discovered in March 2026, where researchers documented 72 malicious Open […] The post 73 Open VSX Sleeper Extensions Linked to GlassWorm Activate New Malware Campaign appeared first on Cyber Security News

Full text archived locally
✦ AI Summary · Claude Sonnet


    HomeCyber Security News 73 Open VSX Sleeper Extensions Linked to GlassWorm Activate New Malware Campaign By Abinaya April 26, 2026 The GlassWorm supply chain attack targeting the Open VSX marketplace has escalated with the discovery of 73 new “sleeper” extensions. Identified in April 2026, this cluster marks a dangerous shift in how threat actors distribute malware to software developers. This activity follows a major wave discovered in March 2026, where researchers documented 72 malicious Open VSX extensions tied to the GlassWorm operation. Earlier variants abused extension dependency features to install malicious loaders silently. However, the new April 2026 cluster shows that attackers are evolving their tactics to evade security scans. The Sleeper Extension Strategy A sleeper extension is a fake package published by threat actors before it is weaponized. These extensions initially appear harmless to build visual trust, gain credibility, and gather downloads. Attackers use newly created GitHub accounts to publish cloned versions of popular tools. For example, attackers created a fake Turkish Language Pack for Visual Studio Code that closely mimicked the legitimate version. They copied the globe icon and the description, while simply swapping the publisher name. A fake Turkish language pack for Visual Studio Code(source :socket) Once developers install these cloned tools, the attackers wait before pushing a software update that delivers the malware. At least six of the 73 new extensions have already been activated to deliver payloads. Evolving Delivery Mechanisms In this latest wave, the extension acts only as a thin loader to fetch external payloads. The malicious code is no longer directly visible in the extension’s source code, increasing the likelihood of evading detection. The campaign uses two primary execution methods: Native Binaries: Bundled .node files are hidden inside the extension code. A simple JavaScript file runs the binary, which contains embedded URLs that download malicious .vsix files for IDEs such as VS Code and Cursor. Obfuscated JavaScript: The malicious logic is heavily obfuscated and does not rely on bundled binary files. The code decodes itself at runtime, retrieves a malicious .vsix payload from a GitHub release, and installs it through command-line paths. Indicators of Compromise Security teams should monitor for the following indicators: Native Installer Binaries (SHA256): 1b62b7c2ed7cc296ce821f977ef7b22bae59ef1dcdb9a34ae19467ee39bcf168. Downloaded VSIX Payload (SHA256): 97c275e3406ad6576529f41604ad138c5bdc4297d195bf61b049e14f6b30adfd. Malicious GitHub Hosting: github[.]com/SquadMagistrate10/wnxtgkih. Confirmed Malicious Extensions: outsidestormcommand. monochromator-theme, boulderzitunnel. vscode-buddies. According to Socket Research Team, developers must verify publisher namespaces and inspect download counts carefully before installing extensions from the Open VSX marketplace. Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories. Tags cyber security cyber security news Copy URL Linkedin Twitter ReddIt Telegram Abinayahttps://cybersecuritynews.com/ Abi is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space. Trending News Hackers Abuse GitHub Issue Notifications to Phish Developers Through Malicious OAuth Apps Hackers Abuse Compromised Routers to Hide China-Linked Cyber Operations Hackers Abuse Fake Wallpaper App and YouTube Channel to Spread notnullOSX Malware NIST Shifts to Risk-Based NVD Model as CVE Submissions Surge 263% Since 2020 Lovable AI App Builder Reportedly Exposes Thousands of Projects Data via API Flaw Latest News Cyber Security New Windows RPC Vulnerability Lets Attackers Escalate Privileges Across All Windows Versions Cyber Security News CISA Warns of Multiple SimpleHelp Vulnerabilities Exploited in Attack Cyber Security News Claude AI Agents Close 186 Deals in Anthropic’s Marketplace Experiment Bug Bounty GPT‑5.5 Bio Bug Bounty to Strengthen Advanced AI Capabilities Cyber Security News Hackers Can Abuse Entra Agent ID Administrator Role to Hijack Service Principals
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    Apr 26, 2026
    Archived
    Apr 26, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗