🕵🏻‍♂️ [InfoSec MASHUP] - This week's news cycle handed us the usual parade of breaches, arrests, and patch-your-stuff urgency — but if you squint at the #Malware section long enough, a more uncomfortable story emerges. #SAP-related npm packages backdoored with a credential stealer. A popular #PyPI package hijacked via a forged signed release pushed through a compromised GitHub Actions workflow. Seventy-three "sleeper" extensions quietly sitting in #OpenVSX, waiting. The common thread: attackers aren't breaking down the front door anymore. They're walking in through the tools developers use every day, often with a valid signature and a clean commit history.

What makes this particularly fun — in the way a slow-motion disaster is fun — is that the blast radius isn't just the developer who ran pip install. It's every downstream user, every CI/CD pipeline, every AI coding agent that helpfully executed the preinstall hook without asking questions. The supply chain isn't a niche threat vector reserved for nation-state ops anymore. It's where commodity attackers are increasingly playing, because it scales beautifully and the detection gap remains embarrassingly wide.

→ Week #18/2026 also covers: Supply chain attackers found the path of least resistance, #OpenSSH patched a bug older than most junior devs, and #Europe is done pretending U.S. #cloud is a neutral choice.

Full issue 👉 https://infosec-mashup.santolaria.net/p/infosec-mashup-18-2026-shinyhunters-week-off-they-didn-t-take-one

If you find it useful, subscribe to get it in your inbox every weekend 📨 #infosecMASHUP #cybersecurity #infosec #threatintel #AI

🕵🏻‍♂️ [InfoSec MASHUP] 18/2026 - ShinyHunters' Week Off (They Didn't Take One)

Plus: Supply chain attackers found the path of least resistance, OpenSSH patched a bug older than most junior devs, and Europe is done pretending U.S. cloud is a neutral choice

X’s InfoSec Newsletter
GlassWorm malware attacks return via 73 OpenVSX "sleeper" extensions

A new wave of the Glassworm campaign is targeting the OpenVSX ecosystem with 73 "sleeper" extensions that turn malicious after an update.

BleepingComputer

GlassWorm Malware Resurfaces Through 73 OpenVSX Extensions

Researchers at Socket have uncovered a sneaky new wave of GlassWorm malware, this time hiding in 73 OpenVSX extensions that behave like sleepers - seemingly harmless at first, but turning malicious after a stealthy update. Six of these extensions have already been activated, unleashing malware on unsuspecting developers.

https://osintsights.com/glassworm-malware-resurfaces-through-73-openvsx-extensions?utm_source=mastodon&utm_medium=social

#GlasswormMalware #Openvsx #MalwareOperations #EmergingThreats #ApplicationSecurity

GlassWorm Malware Resurfaces Through 73 OpenVSX Extensions

Discover how 73 OpenVSX extensions spread GlassWorm malware and learn how to protect yourself - read the latest threat analysis now.

OSINTSights

Researchers Expose 73 Fake VS Code Extensions Spreading GlassWorm v2 Malware

Malicious VS Code extensions are putting developers at risk, with 73 fake extensions discovered spreading GlassWorm v2 malware, allowing attackers to stealthily retrieve and execute payloads after activation. These extensions act as loaders, using obfuscated JavaScript to achieve the same malicious…

https://osintsights.com/researchers-expose-73-fake-vs-code-extensions-spreading-glassworm-v2-malware?utm_source=mastodon&utm_medium=social

#MalwareOperations #GlasswormV2 #VsCodeExtensions #OpenVsx #InformationstealingCampaign

Researchers Expose 73 Fake VS Code Extensions Spreading GlassWorm v2 Malware

Discover 73 fake VS Code extensions spreading GlassWorm v2 malware and learn how to protect yourself - read the latest security research now.

OSINTSights

GlassWorm muta ancora: 73 estensioni “sleeper” su Open VSX pronte a svegliarsi come malware

La campagna GlassWorm torna con 73 nuove estensioni dormanti sul marketplace Open VSX. Socket ha rilevato nuove attivazioni malware da estensioni che erano parse innocue per settimane: un escalation preoccupante per l'intera pipeline di sviluppo software.

https://insicurezzadigitale.com/glassworm-muta-ancora-73-estensioni-sleeper-su-open-vsx-pronte-a-svegliarsi-come-malware/

Bugs ohne Bounty: Eclipse Foundation startet Sicherheitsprogramm für Open VSX

Schutz für die Lieferkette: Die Eclipse Foundation motiviert Entwickler dazu, Schwachstellen in der Open VSX Registry zu finden – Geld gibt es jedoch nicht.

heise online

OpenVSX ....

GlassWorm is the name given to an ongoing malware campaign that has repeatedly infiltrated Microsoft Visual Studio Marketplace and Open VSX

all VSC like is compromize.
https://thehackernews.com/2026/03/glassworm-supply-chain-attack-abuses-72.html

#openvsx #microsoft #VSCode

GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers

GlassWorm campaign used 72 malicious Open VSX extensions and infected 151 GitHub repositories, enabling stealth supply-chain attacks on developers.

The Hacker News
GlassWorm malware hits 400+ code repos on GitHub, npm, VSCode, OpenVSX

The GlassWorm supply-chain campaign has returned with a new, coordinated attack that targeted hundreds of packages, repositories, and extensions on GitHub, npm, and VSCode/OpenVSX extensions.

BleepingComputer
The Open VSX Registry continues to grow as shared infrastructure for modern developer platforms.
DevOps.com covers how the Eclipse Foundation is expanding the reach of this vendor-neutral extension marketplace and strengthening its reliability and security.
Read the article:
https://devops.com/eclipse-foundation-extends-scope-and-reach-of-open-vsx-registry/
#OpenSource #DevTools #OpenVSX