By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos
Tech News

GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos

By Viral Trending Content 4 Min Read
Share
SHARE

Ravie LakshmananMar 16, 2026Malware / Cryptocurrency

The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of Python repositories.

“The attack targets Python projects — including Django apps, ML research code, Streamlit dashboards, and PyPI packages — by appending obfuscated code to files like setup.py, main.py, and app.py,” StepSecurity said. “Anyone who runs pip install from a compromised repo or clones and executes the code will trigger the malware.”

According to the software supply chain security company, the earliest injections date back to March 8, 2026. The attackers, upon gaining access to the developer accounts, rebasing the latest legitimate commits on the default branch of the targeted repositories with malicious code, and then force-pushing the changes, while keeping the original commit’s message, author, and author date intact.

This new offshoot of the GlassWorm campaign has been codenamed ForceMemo. The attack plays out via the following four steps –

  • Compromise developer systems with GlassWorm malware through malicious VS Code and Cursor extensions. The malware contains a dedicated component to steal secrets, such as GitHub tokens.
  • Use the stolen credentials to force-push malicious changes to every repository managed by the breached GitHub account by rebasing obfuscated malware to Python files named “setup.py,” “main.py,” or “app.py.”
  • The Base64-encoded payload, appended to the end of the Python file, features GlassWorm-like checks to determine if the system has its locale set to Russian. If so, it skips execution. In all other cases, the malware queries the transaction memo field associated with a Solana wallet (“BjVeAjPrSKFiingBn4vZvghsGj9KCE8AJVtbc9S8o8SC”) previously linked to GlassWorm to extract the payload URL.
  • Download additional payloads from the server, including encrypted JavaScript that’s designed to steal cryptocurrency and data.

“The earliest transaction on the C2 address dates to November 27, 2025 — over three months before the first GitHub repo injections on March 8, 2026,” StepSecurity said. “The address has 50 transactions total, with the attacker regularly updating the payload URL, sometimes multiple times per day.”

The disclosure comes as Socket flagged a new iteration of the GlassWorm that technically retains the same core tradecraft while improving survivability and evasion by leveraging extensionPack and extensionDependencies to deliver the malicious payload by means of a transitive distribution model.

In tandem, Aikido Security also attributed the GlassWorm author to a mass campaign that compromised more than 151 GitHub repositories with malicious code concealed using invisible Unicode characters. Interestingly, the decoded payload is configured to fetch the C2 instructions from the same Solana wallet, indicating that the threat actor has been targeting GitHub repositories in multiple waves.

The use of different delivery methods and code obfuscation methods, but the same Solana infrastructure, suggests ForceMemo is a new delivery vector maintained and operated by the GlassWorm threat actor, who has now expanded from compromising VS Code extensions to a broader GitHub account takeover.

“The attacker injects malware by force-pushing to the default branch of compromised repositories,” StepSecurity noted. “This technique rewrites git history, preserves the original commit message and author, and leaves no pull request or commit trail in GitHub’s UI. No other documented supply chain campaign uses this injection method.”

You Might Also Like

Best Fitness Tracker 2026: Fitbits, Bands & Hybrids

Your Photos Are Probably Giving Away Your Location. Here’s How to Stop That

Critical Fortinet Forticlient EMS flaw now exploited in attacks

21 organisations currently adding to their engineering teams

M5 Ultra Mac Studio Leaks: 8K Video and GPU Benchmarks

TAGGED: Code Injection, cryptocurrency, Cyber Security, Cybersecurity, Data Exfiltration, Developer Security, GitHub, Internet, Malware, Python
Share This Article
Facebook Twitter Copy Link
Previous Article EU-US trade remains strong despite tariff pressure, study finds
Next Article Samsung’s wide new Galaxy foldable will take on the iPhone Ultra
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Dimension 20 Is Finally Doing A Vampire: The Masquerade Campaign And I Am So Stoked
Gaming News
Brush up: How to plan a creative holiday in Europe
Travel
Best Fitness Tracker 2026: Fitbits, Bands & Hybrids
Tech News
Your Photos Are Probably Giving Away Your Location. Here’s How to Stop That
Tech News
Critical Fortinet Forticlient EMS flaw now exploited in attacks
Tech News
Is it time Premier League Darts introduced a reserve player for withdrawals?
Sports
Jefferies screams buy on HDFC Bank, says valuation attractive after 25% dip
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Dimension 20 Is Finally Doing A Vampire: The Masquerade Campaign And I Am So Stoked

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Dimension 20 Is Finally Doing A Vampire: The Masquerade Campaign And I Am So Stoked
March 30, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?