GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers

Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a “significant escalation” in how it propagates through the Open VSX registry.
“Instead of requiring every malicious listing to embed the loader directly, the threat actor is now abusing extensionPack and extensionDependencies to turn initially standalone-looking extensions into transitive

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware

Next Post

OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration

Related Posts
Total
0
Share