Supply Chain Attack on Open VSX Registry

Cybersecurity researchers have uncovered a sophisticated supply chain attack targeting the Open VSX Registry. The attack involved compromising a legitimate developer's account to spread the GlassWorm malware. On January 30, 2026, four established Open VSX extensions published by the oorzc author were found to have malicious versions published to Open VSX, embedding the GlassWorm malware.

The attackers exploited the trust associated with the compromised developer's account to push malicious updates to downstream users. This tactic allowed the threat actors to bypass traditional security measures and gain unauthorized access to sensitive systems.

  • The attack highlights the importance of securing developer accounts and implementing robust security measures to prevent supply chain attacks.
  • The use of compromised developer accounts to spread malware underscores the need for continuous monitoring and verification of software updates.
  • Downstream users are advised to review their systems for any signs of compromise and to update their software with caution.

Cybersecurity is not just a technical issue; it is a human issue.

Nadya Bartol