73 Open VSX Sleeper Extensions Linked to GlassWorm Show New ...

This title could be clearer and more informative.Try out Clickbait Shieldfor free (5 uses left this month).

Socket Research Team is tracking a new cluster of 73 impersonation extensions on the Open VSX marketplace linked to the GlassWorm campaign. These extensions were initially published as benign-looking sleepers by newly created GitHub accounts, with at least six already activated to deliver malware. The campaign uses cloned listings of popular extensions (e.g., Turkish Language Pack) to build visual trust before weaponizing them via updates. Delivery mechanisms have evolved to include bundled native .node binaries with embedded GitHub release URLs, obfuscated JavaScript loaders, and external VSIX payload retrieval — targeting VS Code, Cursor, Windsurf, and VSCodium. The shift moves critical malicious logic outside of what static scanners typically inspect, making detection harder.

5m read timeFrom socket.dev
Post cover image
Table of contents
Cloned Listings Designed to Look Legitimate #Example: Obfuscated Runtime Payload Retrieval #Indicators of Compromise (IOCs) #

Sort: