GlassWorm's New Trick: OpenVSX Extensions Now 'Sleep' Before Attacking
The cybersecurity world braced for another supply chain assault, but GlassWorm's latest move in the OpenVSX ecosystem is a quiet, insidious evolution. They're no longer just dropping malware; they're planting seeds.
⚡ Key Takeaways
- GlassWorm has shifted tactics, using 'sleeper' extensions in OpenVSX that deliver malware via updates. 𝕏
- The campaign involves 73 cloned extensions designed to trick developers with similar icons and descriptions. 𝕏
- This evolution poses a greater challenge to detection as the malicious payload is fetched post-installation, not embedded initially. 𝕏
Worth sharing?
Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.
Originally reported by Bleeping Computer