Home Cybersecurity Disaster Recovery Identity Security AI Governance Sectors IT Services About Insights Contact
Cybersecurity

Developer Supply Chain Under Siege as GlassWorm Evolves Dependency Attacks

16 March 2026 · 4 min read

← All insights

The developer supply chain faces an escalating threat as GlassWorm malware has compromised 72 new Visual Studio Code extensions since January 2026, according to reporting from Socket. This represents a significant evolution in attack methodology, with cybercriminals abandoning direct malware embedding in favour of sophisticated dependency manipulation that sidesteps marketplace security controls.

GlassWorm malware employs a dependency abuse technique where attackers initially publish clean extensions that later receive updates pulling in malicious dependencies from external repositories. This approach allows malicious code to infiltrate developer environments whilst appearing legitimate during initial marketplace review processes.

Key Facts:
- 72 new VSCode extensions infected with GlassWorm since January 2026
- Attackers use clean initial submissions then introduce malicious dependencies via updates
- Open VSX marketplace particularly targeted due to less stringent review processes
- Malware specifically targets authentication tokens and source code repositories

The Dependency Deception Strategy

Traditional supply chain attacks embedded malicious code directly into extensions or packages, making detection relatively straightforward for automated security scanners. GlassWorm represents a tactical shift toward what security researchers term "transitive dependency attacks". The malware authors publish extensions with seemingly innocuous functionality, then later update them to include dependencies from compromised or malicious packages hosted on external repositories.

This technique exploits the inherent trust model of package management systems, where updates to dependencies rarely trigger the same scrutiny as new package submissions. The NCSC has warned that such approaches represent a "significant blind spot" in current software supply chain security practices, particularly affecting organisations that rely heavily on developer tooling and extensions.

Why VSCode Extensions Present an Attractive Target

Developer environments contain some of the most sensitive assets within any organisation: source code, API keys, database credentials, and direct access to production systems. VSCode, as the dominant code editor, represents a particularly lucrative attack vector because extensions run with significant privileges and often access multiple repositories and cloud services simultaneously.

The Open VSX marketplace has become a primary target due to its more permissive review process compared to Microsoft's official marketplace. This creates a scenario where GlassWorm malware abuses extension dependencies to target UK developers, particularly those working in smaller organisations that may lack enterprise-grade security tooling.

What Makes This Attack Campaign Different?

The current GlassWorm campaign demonstrates several concerning evolutions. Rather than broad-spectrum attacks, the malware exhibits targeted behaviour, focusing on specific development frameworks and cloud service integrations commonly used in UK businesses. The malware maintains persistence through legitimate-looking extension updates and employs anti-analysis techniques that make detection significantly more challenging.

Socket's research indicates the malware specifically targets authentication tokens for GitHub, AWS, Azure, and Google Cloud Platform services. Once installed, GlassWorm can exfiltrate source code, modify build processes, and potentially inject backdoors into production applications. The campaign's sophistication suggests state-sponsored or well-resourced criminal groups rather than opportunistic attackers.

Boardroom Questions

Quick Diagnostic

PTG Advisory Team
Pacific Technology Group

Related Reading

GlassWorm Malware Abuses Extension Dependencies to Target UK Developers — GlassWorm supply chain attacks evolve to exploit VS Code extension dependencies, with 72 new malicious extensions target

86% of UK Businesses Don't Check Supplier Security — NCSC data reveals alarming security gaps as supply chain attacks surge 50%, with manufacturing firms particularly vulner

CYBERUK 2026 Sets Stage for Next Decade of UK Cyber Defence — The NCSC's flagship conference returns to Glasgow with 2,500+ international security leaders to define UK cybersecurity

Smart Factories Create Perfect Storm for OT Cyberattacks — Manufacturing's digital transformation creates dangerous convergence between IT networks and operational technology, wit

Chrome Zero-Days Already Under Attack Before UK Businesses Can Patch — Google patched two Chrome vulnerabilities already exploited in the wild. UK organisations face a critical window to upda

Strengthen your organisation's security posture

Take the PTG Cyber Assessment Speak With Our Advisory Team

Ready to strengthen your cyber resilience?

Talk to our team about protecting your organisation against evolving threats.

Get in Touch