Open VSX rotates access tokens used in supply-chain malware attack
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解主要事件和关键点。 文章讲的是Open VSX registry的访问令牌被泄露,导致恶意扩展被发布。泄露是由开发者不小心将令牌放在公共仓库里。Wiz的研究人员发现了这个问题,报告了超过550个密钥的泄露,影响了下载量很高的项目。攻击者利用这些令牌上传恶意扩展,形成了供应链攻击。 然后,文章提到这些泄露的令牌被用于名为“GlassWorm”的恶意软件活动。Koi Security的研究人员指出,该恶意软件隐藏在不可见的Unicode字符中,试图窃取开发者凭证,并针对加密钱包数据,动机可能是财务收益。 Open VSX团队迅速应对,移除了恶意扩展,并旋转或撤销了令牌。他们还计划实施额外的安全措施,比如缩短令牌寿命、加快撤销流程、自动化安全扫描以及与VS Code和其他市场合作分享威胁情报。 此外,攻击者转向GitHub继续活动,使用同样的Unicode隐藏技术。这表明威胁仍然活跃。 总结时要涵盖泄露事件、攻击影响、应对措施以及后续行动。控制在100字以内,所以需要简洁明了。 </think> Open VSX registry因开发者意外泄露访问令牌,导致恶意扩展被发布。研究人员发现超550个密钥泄露后,攻击者利用这些令牌上传恶意软件“GlassWorm”,窃取开发者凭证并 targeting加密钱包数据。Open VSX迅速移除恶意扩展并加强安全措施以防止 future attacks. 2025-11-2 21:45:19 Author: www.bleepingcomputer.com(查看原文) 阅读量:11 收藏

Supply chain

The Open VSX registry rotated access tokens after they were accidentally leaked by developers in public repositories and allowed threat actors to publish malicious extensions in a supply chain attack.

The leak was discovered by Wiz researchers two weeks ago, when they reported an exposure of over 550 secrets across Microsoft VSCode and Open VSX marketplaces.

Some of those secrets reportedly could give access to projects with 150,000 downloads, allowing the threat actors to upload malicious versions of extension, creating a significant supply-chain risk.

Wiz

Open VSX, developed under the Eclipse Foundation, is an open-source alternative to Microsoft's Visual Studio Marketplace, a platform that offers extensions for the VSCode IDE.

Open VSX serves as a community-driven registry for VS Code–compatible extensions for use on AI-powered forks that cannot use Microsoft's platform, such as Cursor and Windsurf.

Some of the leaked tokens were subsequently used in a malware campaign a few days later, dubbed 'GlassWorm'.

Koi Security researchers reported that GlassWorm deployed a self-spreading malware hidden within invisible Unicode characters, which attempted to steal developer credentials and trigger cascading breaches across reachable projects.

These attacks also targeted cryptocurrency wallet data from 49 extensions, indicating that the attackers' motive was likely financial gain.

The Open VSX team and the Eclipse Foundation published a blog post about the campaign and leaked tokens, stating that GlassWorm was not, in fact, self-replicating, although it did target developer credentials.

"The malware in question was designed to steal developer credentials, which could then be used to extend the attacker's reach, but it did not autonomously propagate through systems or user machines," clarifies the Open VSX team.

"We also believe that the reported download count of 35,800 overstates the actual number of affected users, as it includes inflated downloads generated by bots and visibility-boosting tactics used by the threat actors."

Despite that, the threat was quickly contained upon notification, and as of October 21, all malicious extensions were removed from the Open VSX registry, and associated tokens were rotated or revoked.

Open VSX has now confirmed that the incident is fully contained with no ongoing impact and that they plan on implementing additional security measures to prevent a future attack.

These security enhancements are summarized below:

  • Shorten token lifetimes to reduce exposure impact.
  • Introduce faster revocation workflows for leaked credentials.
  • Perform automated security scans for extensions during publication.
  • Collaborate with VS Code and other marketplaces to share threat intelligence.

BleepingComputer has emailed the Eclipse Foundation to ask how many tokens were rotated in total, but a statement wasn't immediately available.

Meanwhile, Aikido reported that the same threat actors behind GlassWorm have now moved to GitHub, where they employ the same Unicode steganography trick to hide their malicious payload.

The researchers report that the operation has already spread to multiple repositories, most of which are focused on JavaScript projects.

The pivot to GitHub indicates that the threat remains active, swiftly rotating through open-source ecosystems after exposure.

Wiz

Secrets Security Cheat Sheet: From Sprawl to Control

Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

Get the cheat sheet and take the guesswork out of secrets management.


文章来源: https://www.bleepingcomputer.com/news/security/open-vsx-rotates-tokens-used-in-supply-chain-malware-attack/
如有侵权请联系:admin#unsafe.sh