Open VSX Registry Deploys GlassWorm Malware via Four Malicious Extension Versions

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Registry Infiltration: Threat actors successfully compromised a developer account on the Open VSX registry to publish malicious updates.
  • Malware Deployment: Four widely used extensions delivered GlassWorm malware, a sophisticated payload designed to exfiltrate sensitive data from developer workstations.
  • Data Theft: The compromised extensions also focused on stealing macOS credentials and wallets.

An Open VSX supply chain attack involving the distribution of malware through the Eclipse Foundation's registry specifically targets the software supply chain by infiltrating the environments of developers, who often have high-level access to corporate networks and production infrastructure.

Attackers gained unauthorized access through a compromised developer account, enabling them to upload four weaponized extension versions. These malicious oorzc updates appeared legitimate but contained a hidden loader identified as GlassWorm malware. 

GlassWorm Malware Capabilities and Impact

Upon installation of the compromised extension, the GlassWorm malware executes silently in the background. Technical analysis by Socket reveals that GlassWorm is designed for persistence and data theft.

Screenshot of Open VSX Registry showing the oorzc namespace with four published extensions | Source: Socket’s Threat Research team
Screenshot of Open VSX Registry showing the oorzc namespace with four published extensions | Source: Socket’s Threat Research team

The four impacted extensions are:

The attacker avoided Russian-language or Russia-adjacent systems, used Solana transaction memos as a dead drop for next-stage configuration, and focused on macOS credential, session, and wallet theft, including FortiClient VPN configurations.

Mitigation and Supply Chain Security

The compromised extensions have been removed from the registry, but organizations utilizing extensions from Open VSX or similar marketplaces should immediately audit their installed plugins for signs of tampering. 

Security professionals recommend:

These findings align with an early January report from Koi Security that said the GlassWorm malware evolved to specifically target macOS systems, accumulating 50,000 downloads through malicious Open VSX extensions.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: