.webp?ssl=1)
Identified in April 2026, this cluster marks a dangerous shift in how threat actors distribute malware to software developers.
This activity follows a major wave discovered in March 2026, where researchers documented 72 malicious Open VSX extensions tied to the GlassWorm operation.
Earlier variants abused extension dependency features to install malicious loaders silently. However, the new April 2026 cluster shows that attackers are evolving their tactics to evade security scans.
The Sleeper Extension Strategy
A sleeper extension is a fake package published by threat actors before it is weaponized. These extensions initially appear harmless to build visual trust, gain credibility, and gather downloads.
Attackers use newly created GitHub accounts to publish cloned versions of popular tools.
For example, attackers created a fake Turkish Language Pack for Visual Studio Code that closely mimicked the legitimate version. They copied the globe icon and the description, while simply swapping the publisher name.
Once developers install these cloned tools, the attackers wait before pushing a software update that delivers the malware. At least six of the 73 new extensions have already been activated to deliver payloads.
Evolving Delivery Mechanisms
In this latest wave, the extension acts only as a thin loader to fetch external payloads.
The malicious code is no longer directly visible in the extension’s source code, increasing the likelihood of evading detection.
The campaign uses two primary execution methods:
- Native Binaries: Bundled .node files are hidden inside the extension code. A simple JavaScript file runs the binary, which contains embedded URLs that download malicious .vsix files for IDEs such as VS Code and Cursor.
- Obfuscated JavaScript: The malicious logic is heavily obfuscated and does not rely on bundled binary files. The code decodes itself at runtime, retrieves a malicious .vsix payload from a GitHub release, and installs it through command-line paths.
Indicators of Compromise
Security teams should monitor for the following indicators:
- Native Installer Binaries (SHA256): 1b62b7c2ed7cc296ce821f977ef7b22bae59ef1dcdb9a34ae19467ee39bcf168.
- Downloaded VSIX Payload (SHA256): 97c275e3406ad6576529f41604ad138c5bdc4297d195bf61b049e14f6b30adfd.
- Malicious GitHub Hosting: github[.]com/SquadMagistrate10/wnxtgkih.
- Confirmed Malicious Extensions: outsidestormcommand. monochromator-theme, boulderzitunnel. vscode-buddies.
According to Socket Research Team, developers must verify publisher namespaces and inspect download counts carefully before installing extensions from the Open VSX marketplace.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post 73 Open VSX Sleeper Extensions Linked to GlassWorm Activate New Malware Campaign appeared first on Cyber Security News.
Discover more from RSS Feeds Cloud
Subscribe to get the latest posts sent to your email.
