By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos
Computing

GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos

News Room
Last updated: 2026/03/16 at 3:57 PM
News Room Published 16 March 2026
Share
GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos
SHARE

Ravie LakshmananMar 16, 2026Malware / Cryptocurrency

The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of Python repositories.

“The attack targets Python projects — including Django apps, ML research code, Streamlit dashboards, and PyPI packages — by appending obfuscated code to files like setup.py, main.py, and app.py,” StepSecurity said. “Anyone who runs pip install from a compromised repo or clones and executes the code will trigger the malware.”

According to the software supply chain security company, the earliest injections date back to March 8, 2026. The attackers, upon gaining access to the developer accounts, rebasing the latest legitimate commits on the default branch of the targeted repositories with malicious code, and then force-pushing the changes, while keeping the original commit’s message, author, and author date intact.

This new offshoot of the GlassWorm campaign has been codenamed ForceMemo. The attack plays out via the following four steps –

  • Compromise developer systems with GlassWorm malware through malicious VS Code and Cursor extensions. The malware contains a dedicated component to steal secrets, such as GitHub tokens.
  • Use the stolen credentials to force-push malicious changes to every repository managed by the breached GitHub account by rebasing obfuscated malware to Python files named “setup.py,” “main.py,” or “app.py.”
  • The Base64-encoded payload, appended to the end of the Python file, features GlassWorm-like checks to determine if the system has its locale set to Russian. If so, it skips execution. In all other cases, the malware queries the transaction memo field associated with a Solana wallet (“BjVeAjPrSKFiingBn4vZvghsGj9KCE8AJVtbc9S8o8SC”) previously linked to GlassWorm to extract the payload URL.
  • Download additional payloads from the server, including encrypted JavaScript that’s designed to steal cryptocurrency and data.

“The earliest transaction on the C2 address dates to November 27, 2025 — over three months before the first GitHub repo injections on March 8, 2026,” StepSecurity said. “The address has 50 transactions total, with the attacker regularly updating the payload URL, sometimes multiple times per day.”

The disclosure comes as Socket flagged a new iteration of the GlassWorm that technically retains the same core tradecraft while improving survivability and evasion by leveraging extensionPack and extensionDependencies to deliver the malicious payload by means of a transitive distribution model.

In tandem, Aikido Security also attributed the GlassWorm author to a mass campaign that compromised more than 151 GitHub repositories with malicious code concealed using invisible Unicode characters. Interestingly, the decoded payload is configured to fetch the C2 instructions from the same Solana wallet, indicating that the threat actor has been targeting GitHub repositories in multiple waves.

The use of different delivery methods and code obfuscation methods, but the same Solana infrastructure, suggests ForceMemo is a new delivery vector maintained and operated by the GlassWorm threat actor, who has now expanded from compromising VS Code extensions to a broader GitHub account takeover.

“The attacker injects malware by force-pushing to the default branch of compromised repositories,” StepSecurity noted. “This technique rewrites git history, preserves the original commit message and author, and leaves no pull request or commit trail in GitHub’s UI. No other documented supply chain campaign uses this injection method.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article How Often Are Toll Cameras Wrong? Here’s What You Need To Know – BGR How Often Are Toll Cameras Wrong? Here’s What You Need To Know – BGR
Next Article Companies House restarts online services following cyber breach | Computer Weekly Companies House restarts online services following cyber breach | Computer Weekly
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

2 Monster Artificial Intelligence (AI) Stocks With up to 70% Upside to Buy Now, According to Wall Street
2 Monster Artificial Intelligence (AI) Stocks With up to 70% Upside to Buy Now, According to Wall Street
Software
5+ Crypto Sculptures You Can Visit Worldwide | HackerNoon
5+ Crypto Sculptures You Can Visit Worldwide | HackerNoon
Computing
What disruption? Deutsche Bank turns bullish on software stocks, saying AI fears have peaked.
What disruption? Deutsche Bank turns bullish on software stocks, saying AI fears have peaked.
News
Startup Yourco gets  million investment to expand workforce communication technology
Startup Yourco gets $6 million investment to expand workforce communication technology
News

You Might also Like

5+ Crypto Sculptures You Can Visit Worldwide | HackerNoon
Computing

5+ Crypto Sculptures You Can Visit Worldwide | HackerNoon

9 Min Read
Seattle puts Microsoft Copilot expansion on hold as new mayor takes stock of AI
Computing

Seattle puts Microsoft Copilot expansion on hold as new mayor takes stock of AI

4 Min Read
FFmpeg 8.1 Released With Experimental xHE-AAC MPS212, More Vulkan Acceleration
Computing

FFmpeg 8.1 Released With Experimental xHE-AAC MPS212, More Vulkan Acceleration

1 Min Read
AMD CEO Lisa Su visits Lenovo Beijing headquarters · TechNode
Computing

AMD CEO Lisa Su visits Lenovo Beijing headquarters · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?