Invaders
Back to Blog
INVADERS
BlogGet Protected
  1. Home
  2. Blog
  3. Threat Hunting & Intel
  4. GlassWorm Shifts to Transitive Open VSX Dependencies in Developer Supply-Chain Push
Threat Hunting & Intel

GlassWorm Shifts to Transitive Open VSX Dependencies in Developer Supply-Chain Push

Lucas OliveiraLucas OliveiraResearch
March 21, 2026·5 min read

Summarize with:

ChatGPTClaudePerplexityGoogle AI
GlassWorm Shifts to Transitive Open VSX Dependencies in Developer Supply-Chain Push

Share

GlassWorm is no longer just a story about obviously malicious extensions. The latest research shows the campaign is evolving into a broader software supply-chain problem by abusing how Open VSX extensions can automatically pull other extensions during installation. That shift matters because it lets an actor hide the truly malicious component one layer deeper inside the dependency chain, reducing the odds that a developer or a marketplace reviewer will spot the risk in time.

According to Socket, the campaign has been linked to at least 72 additional malicious Open VSX extensions since late January 2026. More importantly, some of those packages now abuse extensionPack and extensionDependencies relationships to act as indirect delivery vehicles. Microsoft’s own Visual Studio Code documentation confirms these manifest fields can automatically install referenced extensions, which makes them convenient for legitimate packaging but also useful to attackers when trust in one extension is used to smuggle in another.

The result is a more dangerous pattern for threat intelligence: a package can appear benign at first, gain credibility, and later be updated to silently install a second GlassWorm-linked extension. For defenders, that changes the problem from “scan suspicious code” to “monitor evolving extension relationships and update paths across the developer toolchain.”

Why the new GlassWorm technique matters

The key change in this campaign is transitive delivery. Instead of embedding the loader in every malicious extension, the operator can make one extension reference another through manifest metadata. If the user installs the first package, the editor may automatically fetch the second. That means the visible extension a developer trusts may not be the same package that ultimately delivers the payload.

Socket said the campaign still uses familiar GlassWorm tradecraft, including staged JavaScript execution, Russian locale checks, Solana memo lookups, and heavier obfuscation. The newer twist is operational: the attacker can now delay or relocate the malicious behavior so it sits in a linked extension rather than the one that first attracted the install.

That lowers visibility in several ways:

  • It weakens one-time extension review.
  • It creates room for a benign-looking package to become malicious in a later update.
  • It complicates incident scoping because defenders may initially inspect the wrong extension.
  • It widens blast radius across developer endpoints where tokens, cloud credentials, and local secrets are often within reach.

This is not only an Open VSX problem

Aikido reported that the same GlassWorm actor is also tied to a March 2026 wave of hidden-Unicode injections across at least 151 GitHub repositories, with related activity observed in npm and VS Code ecosystem packages. That matters because it suggests coordination across multiple developer trust layers rather than a single opportunistic campaign.

In practice, this means the same adversary pattern is showing up in:

  • extension marketplaces,
  • GitHub repositories,
  • npm packages, and
  • AI-focused developer tooling.

That multi-ecosystem spread is what turns GlassWorm into a strategic supply-chain issue rather than a narrow marketplace clean-up problem. If developers inherit risk from repositories, packages, and extensions at the same time, traditional “download only trusted tools” guidance becomes much less reliable.

What defenders should check now

Security teams should treat developer workstations as production-relevant assets, not just engineering endpoints. A successful compromise in this layer can expose source code, build secrets, API tokens, signing material, and internal environment data. In many environments, that is enough to create follow-on access without directly exploiting customer-facing infrastructure.

Three actions deserve immediate attention:

1. Audit extension history, not just current code

Review recently installed or updated Open VSX and VS Code-compatible extensions for newly introduced extensionPack or extensionDependencies fields. The risk is often in the relationship graph, not the obvious package contents.

2. Hunt for post-install behavior on developer endpoints

Look for suspicious outbound connections, script execution chains, secret access patterns, and any signs of command-and-control resolution tied to extension activity. If an extension installs quietly and then reaches out for second-stage logic, the endpoint telemetry is often where the real story appears.

3. Tighten controls around local secrets

Developer machines often carry cached tokens, cloud credentials, package registry access, and CI/CD material. Reducing standing access, segmenting high-value credentials, and using short-lived tokens can sharply reduce the impact of malware on engineering endpoints.

Strategic takeaway

GlassWorm’s newer Open VSX behavior is important because it attacks trust inheritance. The campaign does not need every package to look overtly malicious if it can turn a tolerated extension into a delivery path for a linked one. Combined with parallel GitHub and npm activity, this shows how modern software supply-chain operations increasingly target the places where developers discover, install, and update tools every day.

For defenders, the lesson is straightforward: extension manifests, dependency relationships, and update history now deserve the same scrutiny as source code itself. If your security program still treats developer tooling as low-risk convenience software, GlassWorm is a sharp reminder that the build environment is part of the attack surface.

Sources

  • Socket, "72 Malicious Open VSX Extensions Linked to GlassWorm Campaign Now Using Transitive Dependencies," published March 13, 2026.
  • Aikido, "Glassworm Is Back: A New Wave of Invisible Unicode Attacks Hits Hundreds of Repositories," published March 2026.
  • Microsoft Visual Studio Code, "Extension Manifest" reference for extensionPack and extensionDependencies.
  • The Hacker News, "GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers," published March 2026.

References

  1. Socket — 72 Malicious Open VSX Extensions Linked to GlassWorm Campaign Now Using Transitive Dependencies
  2. Aikido — Glassworm Is Back: A New Wave of Invisible Unicode Attacks Hits Hundreds of Repositories
  3. Visual Studio Code — Extension Manifest reference
  4. The Hacker News — GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
Tags:
Incident
Threat Intel
Supply Chain Security
Developer Security
GitHub
npm Security
Malware
L

Written by

Lucas Oliveira

Research

A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.

Hot TopicsLast 7 days
1
#CVE
10p
2
#cyberthreads
7p
3
#Account Takeover
4p
4
#Credential Theft
3p
5
#Data Exfiltration
3p
View all tags →
Categories12
All Articlesvulnerability24Threat Hunting & Intel17Cybercrime5Cloud & Application Security4
Stay Updated

Get the latest cybersecurity insights in your inbox.

You Might Also Like

More in Threat Hunting & Intel →
Cline CLI 2.3.0 supply chain attack silently installed OpenClaw on developer systemsThreat Hunting & Intel

Cline CLI 2.3.0 supply chain attack silently installed OpenClaw on developer systems

Cline CLI 2.3.0 supply chain attack silently installed OpenClaw on developer systems Executive summary The Cline CLI supply chain incident is a practical remind...

Lucas OliveiraMar 195m
FBI seizes Handala sites after destructive Stryker hackThreat Hunting & Intel

FBI seizes Handala sites after destructive Stryker hack

FBI seizes Handala sites after destructive Stryker hack | 2026 Executive Summary The FBI and U.S. Department of Justice have seized two websites linked to Handa...

Lucas OliveiraMar 196m
DarkSword iOS Exploit Chain Hits Multiple Threat ActorsThreat Hunting & Intel

DarkSword iOS Exploit Chain Hits Multiple Threat Actors

DarkSword iOS Exploit Chain Hits Multiple Threat Actors Executive Summary Google Threat Intelligence Group says DarkSword is a full-chain iOS [exploit](https://...

Lucas OliveiraMar 196m
INVADERS

Providing enterprise-grade cybersecurity solutions to protect organizations from evolving digital threats.

FacebookTwitterLinkedIn

Services

  • Web App Vulnerability Reports
  • Threat Hunting & Intelligence
  • Cybercrime & APT Tracking
  • Incident Response & Remediation

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Security Policy

Company

  • About Us
  • Careers
  • Blog
  • Press

© 2026 Invaders Cybersecurity. All rights reserved.

PrivacyTermsCookies