Tuesday, February 3, 2026

New GlassWorm assault targets macOS by way of compromised OpenVSX extensions

New GlassWorm assault targets macOS by way of compromised OpenVSX extensions

A brand new GlassWorm malware assault by way of compromised OpenVSX extensions focuses on stealing passwords, crypto-wallet knowledge, and developer credentials and configurations from macOS programs.

The risk actor gained entry to the account of a respectable developer (oorzc) and pushed malicious updates with the GlassWorm payload to 4 extensions that had been downloaded 22,000 instances.

GlassWorm assaults first appeared in late October, hiding the malicious code utilizing “invisible” Unicode characters to steal cryptocurrency pockets and developer account particulars. The malware additionally helps VNC-based distant entry and SOCKS proxying.

Wiz

Over time and throughout a number of assault waves, GlassWorm impacted each Microsoft’s official Visible Studio Code market and its open-source various for unsupported IDEs, OpenVSX.

In a earlier marketing campaign, GlassWorm confirmed indicators of evolution, focusing on macOS programs, and its builders have been working so as to add a substitute mechanism for the Trezor and Ledger apps.

A new report from Socket’s safety staff describes a brand new marketing campaign that relied on trojanizing the next extensions:

  • oorzc.ssh-tools v0.5.1
  • oorzc.i18n-tools-plus v1.6.8
  • oorzc.mind-map v1.0.61
  • oorzc.scss-to-css-compile v1.3.4

The malicious updates have been pushed on January 30, and Socket studies that the extensions had been innocuous for 2 years. This implies that the oorzc account was most probably compromised by GlassWorm operators.

Based on the researchers, the marketing campaign targets macOS programs completely, pulling directions from Solana transaction memos. Notably, Russian-locale programs are excluded, which can trace on the origin of the attacker.

Environment checks before executing on the host
Setting checks earlier than executing on the host
Supply: Socket

GlassWorm hundreds a macOS data stealer that establishes persistence on contaminated programs by way of a LaunchAgent, enabling execution at login.

It harvests browser knowledge throughout Firefox and Chromium, pockets extensions and pockets apps, macOS keychain knowledge, Apple Notes databases, Safari cookies, developer secrets and techniques, and paperwork from the native filesystem, and exfiltrates every thing to the attacker’s infrastructure at 45.32.150[.]251.

Data theft activity
Knowledge theft exercise
Supply: Socket

Socket reported the packages to the Eclipse Basis, the operator of the Open VSX platform, and the safety staff confirmed unauthorized publishing entry, revoked tokens, and eliminated the malicious releases.

The one exception is oorzc.ssh-tools, which was eliminated utterly from Open VSX as a result of discovering a number of malicious releases.

At present, variations of the affected extensions available on the market are clear, however builders who downloaded the malicious releases ought to carry out a full system clean-up and rotate all their secrets and techniques and passwords.

Trendy IT infrastructure strikes sooner than guide workflows can deal with.

On this new Tines information, find out how your staff can scale back hidden guide delays, enhance reliability by way of automated response, and construct and scale clever workflows on high of instruments you already use.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles