HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

Malicious GlassWorm VS Code Extensions Compromise Development Supply Chain

Attackers have uploaded malicious VS Code extensions to the Open VSX marketplace, embedding self‑propagating GlassWorm malware that can steal credentials and source code. Organizations that allow developers to install third‑party extensions face heightened supply‑chain risk.

LiveThreat™ Intelligence · 📅 April 28, 2026· 📰 darkreading.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
4 recommended
📰
Source
darkreading.com

Malicious GlassWorm VS Code Extensions Compromise Development Supply Chain

What Happened – Attackers have been uploading seemingly benign Visual Studio Code extensions to the Open VSX marketplace that contain self‑propagating GlassWorm malware. The malicious packages automatically download additional payloads and can harvest credentials, source code, and other development assets.

Why It Matters for TPRM

  • Supply‑chain compromise of a widely used developer tool can affect any organization that allows developers to install third‑party extensions.
  • Malware can exfiltrate proprietary code and credentials, creating downstream data‑loss and intellectual‑property risks.
  • The open nature of the marketplace makes it difficult to vet every package, highlighting the need for strict extension‑allowance policies.

Who Is Affected – Technology & SaaS firms, software development shops, cloud‑native enterprises, and any organization that permits developers to install VS Code extensions.

Recommended Actions

  • Audit and restrict which VS Code extensions are allowed on corporate machines.
  • Implement application‑allowlist controls for IDE extensions and enforce code‑signing verification.
  • Monitor network traffic for anomalous outbound connections from developer workstations.
  • Conduct regular threat‑intel reviews of open‑source component repositories.

Technical Notes – The attack leverages the Open VSX supply‑chain; no specific CVE is cited. Malware is delivered via the extension package and can execute arbitrary code, harvest SSH keys, Git credentials, and exfiltrate source repositories. Source: Dark Reading

📰 Original Source
https://www.darkreading.com/application-security/fresh-glassworm-vs-code-extensions-supply-chain

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.