The Glassworm campaign is a serious, ongoing malware attack targeting the developer community, specifically through malicious extensions uploaded to popular repositories for VS Code–compatible editors: the official Microsoft Visual Studio Marketplace and the vendor-neutral alternative, OpenVSX. These platforms are critical resources where developers install a variety of add-ons, including language support, tooling, and themes. The campaign first appeared in October and is now in its third wave, with researchers discovering 24 new packages on the two platforms, indicating a persistent threat despite initial clean-up efforts. The use of these marketplaces allows the malware to impersonate legitimate and essential developer tools, thereby maximizing its potential victim pool.
At the core of the Glassworm malware is its technique for evasion, first documented by Koi Security: it uses “invisible Unicode characters” to mask its malicious code, successfully hiding it from initial review processes on the repositories. Once a developer installs the compromised extension, the malware immediately executes its primary objective: data theft. It aggressively targets sensitive developer assets, attempting to steal GitHub, npm, and OpenVSX account credentials, alongside cryptocurrency wallet data. This broad targeting scope covers an extensive list of 49 extensions, underscoring the high value the attackers place on compromising developer environments and intellectual property.
Beyond credential and data harvesting, the malware establishes a significant level of control over the victim’s machine. It deploys a SOCKS proxy, which is used to covertly route subsequent malicious network traffic through the infected developer’s computer, obscuring the attackers’ origin. Furthermore, Glassworm installs the HVNC client (a High-Performance Virtual Network Computing client), which grants the operators stealthy remote access to the victim’s machine. This combination of tools provides the attackers with both a camouflaged operational channel and persistent, virtually undetectable control over the compromised development environment, dramatically escalating the potential for deeper security breaches.
The ongoing nature of the campaign is a major concern, as the malware has consistently re-emerged on both repositories shortly after previous extensions were removed. The third wave was discovered by Secure Annex researcher John Tuckner, and the new package names clearly demonstrate a sophisticated strategy of broad targeting. The malicious extensions are impersonating popular and widely used developer tools and frameworks such as Flutter, Vim, Yaml, Tailwind, Svelte, React Native, and Vue, making them highly likely to be downloaded by unsuspecting developers. The packages were found across both the VS Marketplace (17 packages) and Open VSX (7 packages).
A key tactic used by the malicious publishers to enhance the success of the infection is the manipulation of marketplace metrics. After their packages are accepted, the publishers push an update containing the malicious code and then engage in artificially inflating the download counts. This practice serves two critical purposes: it makes the extension appear legitimate and trustworthy to developers who often check download numbers, and it manipulates search results. By boosting their numbers, the malicious extension appears higher in search rankings, often placed directly next to the legitimate project it is impersonating, greatly increasing the chances of a developer mistakenly installing the malware.
Reference:






