GlassWorm Malware Campaign Expands with 73 New Sleeper Extensions in Open VSX Marketplace

GlassWorm Malware Campaign Escalates with 73 New Sleeper Extensions in Open VSX Marketplace

In April 2026, cybersecurity researchers identified a significant escalation in the GlassWorm malware campaign, uncovering 73 new sleeper extensions within the Open VSX marketplace. This development marks a concerning evolution in the tactics employed by threat actors to infiltrate developer environments.

Understanding Sleeper Extensions

Sleeper extensions are deceptive packages that appear benign upon initial release, designed to build trust and accumulate downloads over time. Once a sufficient user base is established, attackers deploy updates that introduce malicious payloads. This method allows malware to bypass initial security scans and exploit the trust developers place in widely-used tools.

In this latest wave, attackers utilized newly created GitHub accounts to publish cloned versions of popular tools. For instance, a counterfeit Turkish Language Pack for Visual Studio Code was crafted to closely resemble the legitimate version, including similar icons and descriptions, with only the publisher name altered. Such tactics make it challenging for developers to distinguish between authentic and malicious extensions.

Evolving Delivery Mechanisms

The GlassWorm campaign has refined its delivery methods to enhance stealth and effectiveness. The current strategy involves using the extension as a thin loader to fetch external payloads, thereby concealing malicious code from the extension’s source code and increasing the likelihood of evading detection.

The campaign employs two primary execution methods:

1. Native Binaries: Malicious `.node` files are embedded within the extension code. A simple JavaScript file executes the binary, which contains URLs that download additional malicious `.vsix` files for Integrated Development Environments (IDEs) such as Visual Studio Code and Cursor.

2. Obfuscated JavaScript: Heavily obfuscated JavaScript code decodes itself at runtime, retrieves a malicious `.vsix` payload from a GitHub release, and installs it through command-line paths.

Indicators of Compromise

Security teams should be vigilant for the following indicators associated with this campaign:

– Native Installer Binaries (SHA256): 1b62b7c2ed7cc296ce821f977ef7b22bae59ef1dcdb9a34ae19467ee39bcf168

– Downloaded VSIX Payload (SHA256): 97c275e3406ad6576529f41604ad138c5bdc4297d195bf61b049e14f6b30adfd

– Malicious GitHub Hosting: github[.]com/SquadMagistrate10/wnxtgkih

– Confirmed Malicious Extensions: outsidestormcommand.monochromator-theme, boulderzitunnel.vscode-buddies

Recommendations for Developers

To mitigate the risk of infection, developers are advised to:

– Verify Publisher Namespaces: Ensure that extensions are published by reputable sources.

– Inspect Download Counts: Be cautious of extensions with unusually high or low download counts, as these may indicate fraudulent activity.

– Review Extension Updates: Regularly monitor and review updates to installed extensions for any unexpected changes or behaviors.

By adopting these practices, developers can enhance their security posture and reduce the likelihood of falling victim to such sophisticated supply chain attacks.