# 73 Fake VS Code Extensions Weaponized to Spread GlassWorm v2 Information Stealer
Cybersecurity researchers have identified a significant supply chain attack targeting developers through the Open VSX marketplace, uncovering a cluster of 73 malicious or cloned Visual Studio Code extensions linked to the persistent GlassWorm information-stealing campaign. Six extensions have been confirmed as actively malicious, while the remainder appear designed to establish footholds within developer environments and build credibility for future attacks.
The discovery represents a growing threat to the software development supply chain, where attackers exploit the trust developers place in community extension repositories to distribute sophisticated malware capable of harvesting credentials, source code, and sensitive project data.
## The Threat
The attack centers on GlassWorm v2, an evolved variant of a known information stealer that has been actively targeting developers and organizations for extended periods. The malware is designed to exfiltrate:
The fake extensions are distributed under names closely mimicking legitimate, popular tools. By cloning names and descriptions of genuine VS Code extensions, the attackers exploit the difficulty users face in distinguishing trustworthy packages from imposters—particularly in crowded categories where dozens of similar extensions exist.
## Background and Context
### The VS Code Extension Ecosystem Risk
Visual Studio Code's extension marketplace has become an increasingly attractive target for supply chain attackers. The reasons are straightforward:
Open VSX—a community-maintained open-source alternative to the official VS Code Marketplace—lacks the vetting rigor of Microsoft's marketplace, making it an attractive distribution vector for attackers.
### GlassWorm History
GlassWorm emerged as a targeted information stealer focused on developers and technology professionals. Earlier variants were distributed through:
The v2 iteration shows increased sophistication, with improved evasion techniques, modular architecture, and expanded data exfiltration capabilities. The shift to spoofing legitimate VS Code extensions represents a strategic pivot to exploit the friction-free installation model of extension marketplaces.
## Technical Details
### Attack Mechanics
The infection chain unfolds in several stages:
1. Discovery and Installation
Users searching for legitimate extensions (e.g., "prettier formatter," "eslint," "docker") encounter fake extensions with names like "prettier-formatter-pro" or "eslint-engine." The extensions carry authentic-looking descriptions and download counts inflated through coordinated accounts.
2. Initial Execution
Upon installation, the extension's activation script executes within VS Code's extension host process. Unlike regular user code, extension code operates with elevated privileges and filesystem access.
3. Credential Harvesting
The malware immediately begins scanning for credentials:
~/.ssh/~/.git-credentials and .gitconfig4. Data Exfiltration
Harvested data is encrypted and transmitted to attacker-controlled command-and-control (C2) infrastructure, designed to avoid detection through:
5. Persistence and Lateral Movement
Some variants establish persistence through:
settings.json### The Clone Network
Analysis reveals a coordinated operation with clear hallmarks of sophistication:
| Indicator | Finding |
|-----------|---------|
| Total extensions | 73 identified |
| Confirmed malicious | 6 (active payload delivery) |
| Dormant variants | 67 (awaiting activation or serving as credibility fakes) |
| Registration pattern | Created in coordinated waves with slight time spacing |
| Author accounts | Varied email addresses, possibly using compromised accounts |
| Update frequency | Irregular, suggesting manual staging |
## Implications for Organizations
### Developer Targeting as Corporate Risk
Developers are high-value targets because they control:
A single compromised developer account can grant attackers direct access to an organization's crown jewels. In the context of 73 fake extensions, the potential impact scales to hundreds or thousands of installations.
### Supply Chain Amplification
Unlike traditional malware targeting end-users, developer-focused attacks have multiplier effects:
### Estimated Exposure
While download statistics for the fake extensions were not disclosed in security reports, even modest adoption (hundreds to thousands of installations) represents significant exposure across the enterprise software sector.
## Recommendations
### For Individual Developers
1. Audit installed extensions immediately
- Review the Extensions panel in VS Code
- Cross-reference with official documentation or the Microsoft Marketplace
- Remove any unfamiliar or suspicious extensions
2. Rotate credentials if uncertain about infection timeline
- Change passwords for critical accounts (GitHub, GitLab, Azure DevOps)
- Rotate API keys and OAuth tokens
- Regenerate SSH keys used in development workflows
3. Review Git history on personal and corporate repositories
- Look for unexpected commits or unauthorized access
- Check git logs for unusual activity during periods when malicious extensions may have been active
4. Enable two-factor authentication (2FA) on:
- GitHub, GitLab, and other repository platforms
- Cloud provider accounts (AWS, Azure, GCP)
- Email accounts linked to development tooling
### For Organizations
1. Establish extension governance
- Maintain a curated allowlist of approved VS Code extensions
- Deploy VS Code via organizational settings with restricted extension policies
- Use Microsoft's managed extension marketplaces where available
2. Monitor developer environments
- Implement endpoint detection and response (EDR) on developer workstations
- Log and monitor VS Code installation directories for unauthorized changes
- Alert on credential access from unusual processes
3. Incident response
- Assume compromised developers may have exfiltrated credentials
- Rotate all credentials potentially accessible to affected developers
- Audit repository access logs and deployment histories
- Review source code for injected malicious changes
4. Supply chain visibility
- Audit all third-party extensions used across the organization
- Establish software composition analysis (SCA) tooling to track dependencies
- Conduct periodic reviews of development tooling security
### For Extension Repository Maintainers
## Conclusion
The GlassWorm v2 campaign represents a maturation of supply chain attacks targeting the development community. By weaponizing the trust placed in extension marketplaces, attackers have identified a high-friction-low-trust vector that bypasses many organizational security controls. The discovery of 73 fake extensions underscores the need for developers and organizations to treat extension management with the same rigor applied to production dependencies and access controls.
Immediate action to audit, rotate credentials, and establish extension governance is critical to limiting exposure from this campaign and similar future attacks.