🦠 Ransomware & Malware

GlassWorm's New Trick: OpenVSX Extensions Now 'Sleep' Before Attacking

The cybersecurity world braced for another supply chain assault, but GlassWorm's latest move in the OpenVSX ecosystem is a quiet, insidious evolution. They're no longer just dropping malware; they're planting seeds.

Illustration of a computer screen with code and a sleeping worm icon

⚡ Key Takeaways

  • GlassWorm has shifted tactics, using 'sleeper' extensions in OpenVSX that deliver malware via updates. 𝕏
  • The campaign involves 73 cloned extensions designed to trick developers with similar icons and descriptions. 𝕏
  • This evolution poses a greater challenge to detection as the malicious payload is fetched post-installation, not embedded initially. 𝕏
Published by

Threat Digest

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.