Researchers uncover 73 fake VS Code extensions that carry malware

Summary: Cybersecurity researchers discovered a group of 73 fake VS Code extensions in the Open VSX repository, linked to the GlassWorm v2 malware campaign.

Detect 73 fake VS Code extensions distributing malware and stealing developer data

By MSB

A new cybersecurity investigation has sounded the alarm in the developer community: at least 73 fake Visual Studio Code extensions have been identified as part of an active malware campaign targeting development environments.

The finding, published by researchers and distributed by The Hacker News, reveals a sophisticated operation that uses extension repositories to infiltrate malicious code into tools that millions of programmers use daily.

A silent attack at the heart of development

The detected extensions are clones of legitimate tools: they copy names, icons, and descriptions to deceive users and generate trust.

Of the 73 identified, at least six contain active malicious code, while the rest act as “sleeper packages”, designed to appear harmless until they receive a subsequent malicious update.

This approach allows attackers to build credibility before executing the attack, avoiding initial suspicion.

GlassWorm v2: malware designed to expand

The campaign has been linked to an operation known as GlassWorm v2, an evolution of previous attacks that had already compromised hundreds of packages since late 2025.

The mechanism is particularly concerning:

  • The extensions act as initial loaders
  • They download a second malicious extension from external repositories
  • They install the malware in multiple development environments (VS Code, Cursor, VSCodium, among others)

This turns a single point of entry into a cross-infection across the developer's entire machine.

Credential theft and remote control

The ultimate goal of the attack is clear: gaining persistent access and sensitive data.

According to the researchers, the malware can:

  • Steal credentials, tokens, and system data
  • Install a remote access trojan (RAT)
  • Deploy malicious extensions in browsers to extract additional information

Furthermore, the code is designed to evade detection and prevent execution in certain countries, which indicates a high level of planning.

The new target: developers

This type of campaign confirms a growing trend in cybersecurity: attackers are shifting their focus towards developers and their tools.

Development environments contain critical assets—such as SSH keys, access tokens, and source code—making them high-value targets.

Instead of attacking final applications directly, cybercriminals seek to compromise the supply chain from its origin.

A structural problem

The incident exposes weaknesses in extension ecosystems:

  • Lack of strict controls in marketplaces
  • Ability to execute code with broad privileges
  • Automatic updates that can introduce malware without user intervention

These features, designed to facilitate development, also expand the attack surface.

Conclusion

The discovery of these 73 fake extensions is not an isolated incident, but a sign of change in the threat landscape.

Security no longer depends solely on the code written by developers, but also on the code they install without questioning.

In an environment where a simple extension can compromise an entire system, trust has become the most exploited attack vector.

Key facts

  • 73 fake VS Code extensions were identified in the Open VSX repository.
  • Six of these extensions have been confirmed as malicious.
  • The extensions used in the campaign are cloned versions of legitimate packages.
  • The malware manifests through dormant packages (sleeper packages) and subsequent updates.

Why it matters

This incident highlights the grave risk developers face when using third-party extensions. Attackers are exploiting the inherent trust in popular development tools, requiring companies to strengthen their software supply chain defenses.

X profile@thehackersnewshttps://twitter.com/thehackersnews
Embedded content for: Researchers uncover 73 fake VS Code extensions that carry malware