A new series of attacks has hit the Open VSX platform. About two hours ago, security researchers reported that three more extensions were compromised using invisible Unicode characters. These incidents appear linked to the same threat actor active since March.
Recently, similar compromises were detected in GitHub repositories. The latest intrusions target legitimate Open VSX extensions, marking yet another wave of this persistent campaign.
The research team has already alerted Open VSX administrators and is contacting the individual maintainers of the affected projects. The Eclipse Foundation had issued a security update on October 27, 2025, acknowledging earlier attacks and describing planned countermeasures.
“At the time, they believed that the incident was fully contained. However, today's events suggest this is still an ongoing situation.”
Despite the renewed activity, the researchers praised Open VSX’s upcoming defensive measures. Of particular note is their plan for automated scanning of extensions at publication time, a step expected to prevent future exploit attempts. The team at Aikido, conducting similar scans post-release, endorsed this proactive stance.
“If implemented correctly, this will protect against many attacks in the ecosystem.”
Continuous vigilance remains necessary as malicious actors exploit invisible Unicode malware, with both Open VSX and security teams enhancing detection and prevention measures.
Author’s Summary: Ongoing malware attacks using invisible Unicode show the persistence of supply-chain threats despite recent Open VSX security improvements.