An Open VSX supply chain attack involving the distribution of malware through the Eclipse Foundation's registry specifically targets the software supply chain by infiltrating the environments of developers, who often have high-level access to corporate networks and production infrastructure.
Attackers gained unauthorized access through a compromised developer account, enabling them to upload four weaponized extension versions. These malicious oorzc updates appeared legitimate but contained a hidden loader identified as GlassWorm malware.Â
Upon installation of the compromised extension, the GlassWorm malware executes silently in the background. Technical analysis by Socket reveals that GlassWorm is designed for persistence and data theft.
The four impacted extensions are:
The attacker avoided Russian-language or Russia-adjacent systems, used Solana transaction memos as a dead drop for next-stage configuration, and focused on macOS credential, session, and wallet theft, including FortiClient VPN configurations.
The compromised extensions have been removed from the registry, but organizations utilizing extensions from Open VSX or similar marketplaces should immediately audit their installed plugins for signs of tampering.Â
Security professionals recommend:
These findings align with an early January report from Koi Security that said the GlassWorm malware evolved to specifically target macOS systems, accumulating 50,000 downloads through malicious Open VSX extensions.