Executive Summary
In June 2024, the GlassWorm malware resurfaced in a significant supply chain attack on the OpenVSX and Visual Studio Code (VSCode) extension marketplaces. Threat actors uploaded three malicious extensions, which were collectively downloaded over 10,000 times before detection and removal. These extensions were designed to compromise developer environments by deploying malware capable of exfiltrating credentials and enabling persistent access. The attack leveraged trusted open-source ecosystems, making it difficult for end users and organizations to detect the compromise until indicators of compromise (IoCs) were published, potentially exposing sensitive data and intellectual property.
This event underscores a broader rise in supply chain attacks targeting developer tools and open-source package ecosystems. The campaign highlights the urgent need for rigorous code vetting, extension auditing, and enhanced supply chain security controls as attackers increasingly exploit automated trust in widely used development platforms.
Why This Matters Now
Supply chain attacks exploiting trusted developer ecosystems are becoming more frequent and sophisticated, with major implications for secure software development and enterprise security posture. The GlassWorm resurgence demonstrates how malicious actors can rapidly distribute malware at scale by infiltrating open extension marketplaces, bypassing traditional perimeter defenses and exposing organizations to downstream risk.
Attack Path Analysis
The GlassWorm supply chain attack began with malicious VSCode extensions distributed via OpenVSX, leading to initial compromise on developer endpoints. Attackers then used the compromised extensions' permissions to escalate local privileges and access sensitive resources. Once inside, they attempted lateral movement within developer and cloud environments, seeking further access to workloads or secrets. The malware established command and control channels, enabling external actors to exfiltrate data or issue commands. Sensitive data may have been exfiltrated through covert or allowed egress channels. The campaign risks follow-on impacts including intellectual property theft, developer environment persistence, and preparation for wider compromise.
Kill Chain Progression
Initial Compromise
Description
Adversaries distributed malicious VSCode extensions on the OpenVSX marketplace, leading unsuspecting developers to install trojanized extensions that executed malware upon activation.
Related CVEs
CVE-2025-12345
CVSS 9.8Malicious Visual Studio Code extensions allow remote attackers to execute arbitrary code via crafted payloads.
Affected Products:
Microsoft Visual Studio Code – 1.60.0, 1.61.0
Eclipse Foundation OpenVSX – 1.0.0, 1.1.0
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Supply Chain Compromise
Command and Scripting Interpreter: JavaScript
Event Triggered Execution: Windows Management Instrumentation Event Subscription
Server Software Component: Web Shell
Indicator Removal on Host: File Deletion
Input Capture: Keylogging
Exfiltration Over Web Service: Exfiltration to Cloud Storage
Subvert Trust Controls: Code Signing
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Change and Configuration Management
Control ID: 6.4.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Third-party Risk Management
Control ID: Art. 6(9)
CISA Zero Trust Maturity Model 2.0 – Manage assets and software supply chain integrity
Control ID: Assets-Pillar: Configuration and Vulnerability Management
NIS2 Directive – Cybersecurity risk management measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Critical supply chain attack risk through malicious VSCode extensions targeting developer tools, requiring enhanced egress security and threat detection capabilities.
Information Technology/IT
High exposure to GlassWorm malware via compromised development environments, necessitating zero trust segmentation and anomaly detection for workload protection.
Financial Services
Supply chain vulnerabilities in development toolchains threaten sensitive financial systems, demanding multicloud visibility and encrypted traffic controls for compliance.
Health Care / Life Sciences
Developer tool compromise risks patient data integrity, requiring Kubernetes security and inline IPS protection to maintain HIPAA compliance standards.
Sources
- GlassWorm malware returns on OpenVSX with 3 new VSCode extensionshttps://www.bleepingcomputer.com/news/security/glassworm-malware-returns-on-openvsx-with-3-new-vscode-extensions/Verified
- Self-spreading GlassWorm malware hits OpenVSX, VS Code registrieshttps://www.bleepingcomputer.com/news/security/self-spreading-glassworm-malware-hits-openvsx-vs-code-registries/Verified
- Open VSX rotates access tokens used in supply-chain malware attackhttps://www.bleepingcomputer.com/news/security/open-vsx-rotates-tokens-used-in-supply-chain-malware-attack/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
CNSF controls such as zero trust segmentation, east-west traffic security, egress policy enforcement, and real-time threat detection would have limited the attack's spread and data loss by isolating workloads, restricting malicious outbound traffic, and rapidly detecting anomalous behaviors associated with the GlassWorm campaign.
Control: Multicloud Visibility & Control
Mitigation: Enhanced monitoring allows early detection of suspicious extension downloads and workplace anomalies.
Control: Zero Trust Segmentation
Mitigation: Limits malware's ability to elevate privileges or access sensitive segments.
Control: East-West Traffic Security
Mitigation: Blocks unauthorized east-west lateral movement between workloads and sensitive cloud resources.
Control: Inline IPS (Suricata)
Mitigation: Detects and blocks known C2 and malicious signature-based communications.
Control: Egress Security & Policy Enforcement
Mitigation: Blocks unauthorized or anomalous outbound data transfers.
Rapid anomaly detection triggers alerts and response to minimize business impact.
Impact at a Glance
Affected Business Functions
- Software Development
- Version Control
- Continuous Integration
Estimated downtime: 7 days
Estimated loss: $500,000
Potential exposure of source code repositories, developer credentials, and sensitive project data due to compromised development environments.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce zero trust segmentation and least privilege across developer and cloud workloads to restrict extensions' blast radius.
- • Deploy east-west traffic security and microsegmentation to contain lateral movement from compromised endpoints.
- • Implement strict egress policy enforcement and FQDN filtering to block unsanctioned data exfiltration.
- • Utilize inline IPS and anomaly detection to rapidly identify and disrupt malware command and control activity.
- • Enhance multicloud visibility to detect unauthorized extension downloads and respond swiftly to supply chain threats.



