The developer supply chain faces an escalating threat as GlassWorm malware has compromised 72 new Visual Studio Code extensions since January 2026, according to reporting from Socket. This represents a significant evolution in attack methodology, with cybercriminals abandoning direct malware embedding in favour of sophisticated dependency manipulation that sidesteps marketplace security controls.
GlassWorm malware employs a dependency abuse technique where attackers initially publish clean extensions that later receive updates pulling in malicious dependencies from external repositories. This approach allows malicious code to infiltrate developer environments whilst appearing legitimate during initial marketplace review processes.
Key Facts:
- 72 new VSCode extensions infected with GlassWorm since January 2026
- Attackers use clean initial submissions then introduce malicious dependencies via updates
- Open VSX marketplace particularly targeted due to less stringent review processes
- Malware specifically targets authentication tokens and source code repositories
The Dependency Deception Strategy
Traditional supply chain attacks embedded malicious code directly into extensions or packages, making detection relatively straightforward for automated security scanners. GlassWorm represents a tactical shift toward what security researchers term "transitive dependency attacks". The malware authors publish extensions with seemingly innocuous functionality, then later update them to include dependencies from compromised or malicious packages hosted on external repositories.
This technique exploits the inherent trust model of package management systems, where updates to dependencies rarely trigger the same scrutiny as new package submissions. The NCSC has warned that such approaches represent a "significant blind spot" in current software supply chain security practices, particularly affecting organisations that rely heavily on developer tooling and extensions.
Why VSCode Extensions Present an Attractive Target
Developer environments contain some of the most sensitive assets within any organisation: source code, API keys, database credentials, and direct access to production systems. VSCode, as the dominant code editor, represents a particularly lucrative attack vector because extensions run with significant privileges and often access multiple repositories and cloud services simultaneously.
The Open VSX marketplace has become a primary target due to its more permissive review process compared to Microsoft's official marketplace. This creates a scenario where GlassWorm malware abuses extension dependencies to target UK developers, particularly those working in smaller organisations that may lack enterprise-grade security tooling.
What Makes This Attack Campaign Different?
The current GlassWorm campaign demonstrates several concerning evolutions. Rather than broad-spectrum attacks, the malware exhibits targeted behaviour, focusing on specific development frameworks and cloud service integrations commonly used in UK businesses. The malware maintains persistence through legitimate-looking extension updates and employs anti-analysis techniques that make detection significantly more challenging.
Socket's research indicates the malware specifically targets authentication tokens for GitHub, AWS, Azure, and Google Cloud Platform services. Once installed, GlassWorm can exfiltrate source code, modify build processes, and potentially inject backdoors into production applications. The campaign's sophistication suggests state-sponsored or well-resourced criminal groups rather than opportunistic attackers.
Boardroom Questions
- Do we have visibility into all VSCode extensions and development tools used across our organisation, including those installed on personal devices used for work?
- What controls exist to prevent developers from installing unvetted extensions, and how do we monitor for malicious dependencies in our software supply chain?
- If our development environment were compromised tomorrow, what sensitive data and systems would be at risk, and how quickly could we detect and contain such a breach?
Quick Diagnostic
- Do you maintain an approved list of development tools and extensions that developers can install?
- Can you identify all VSCode extensions currently installed across your development team within the next hour?
- Do you have monitoring in place to detect unusual network activity or data exfiltration from developer workstations?
Related Reading
GlassWorm Malware Abuses Extension Dependencies to Target UK Developers — GlassWorm supply chain attacks evolve to exploit VS Code extension dependencies, with 72 new malicious extensions target
86% of UK Businesses Don't Check Supplier Security — NCSC data reveals alarming security gaps as supply chain attacks surge 50%, with manufacturing firms particularly vulner
CYBERUK 2026 Sets Stage for Next Decade of UK Cyber Defence — The NCSC's flagship conference returns to Glasgow with 2,500+ international security leaders to define UK cybersecurity
Smart Factories Create Perfect Storm for OT Cyberattacks — Manufacturing's digital transformation creates dangerous convergence between IT networks and operational technology, wit
Chrome Zero-Days Already Under Attack Before UK Businesses Can Patch — Google patched two Chrome vulnerabilities already exploited in the wild. UK organisations face a critical window to upda
Strengthen your organisation's security posture

