top of page

GlassWorm Attack Exploits Stolen GitHub Tokens to Infiltrate Python Repositories

  • Mar 16
  • 2 min read

Key Findings


* GlassWorm malware campaign targeting Python repositories


* Attackers use stolen GitHub tokens to force-push malicious code


* Targets Python projects including Django apps, ML code, and PyPI packages


* Earliest injections traced to March 8, 2026


* Uses a new offshoot called "ForceMemo"


* Leverages malicious VS Code and Cursor extensions to steal credentials


* Payload includes cryptocurrency theft and data exfiltration capabilities


Background


The GlassWorm attack represents a sophisticated software supply chain security threat targeting Python developers and repositories. The campaign exploits vulnerabilities in developer systems through malicious Visual Studio Code and Cursor extensions, with the primary goal of stealing GitHub authentication tokens and injecting malware into open-source projects.


Attack Methodology


The attack follows a precise four-step process:


* Compromise developer systems using malicious VS Code extensions


* Steal GitHub credentials and tokens


* Force-push malicious changes to repositories


* Inject obfuscated malware into critical Python files


Payload Characteristics


The malware payload contains several unique features:


* Base64-encoded injection


* Locale-based execution check (skips if system locale is Russian)


* Retrieves additional instructions from a specific Solana wallet


* Designed to steal cryptocurrency and system data


Technical Sophistication


The attackers demonstrate advanced techniques:


* Preserves original commit messages and author information


* Rewrites git history without leaving visible traces


* Uses transitive distribution models


* Regularly updates payload URLs


* Leverages invisible Unicode character obfuscation


Infrastructure


The campaign uses a consistent Solana wallet (BjVeAjPrSKFiingBn4vZvghsGj9KCE8AJVtbc9S8o8SC) as a command and control infrastructure, with transaction history dating back to November 27, 2025.


Potential Impact


The attack potentially compromises hundreds of Python repositories, posing significant risks to developers and organizations relying on open-source software. Researchers warn that simply cloning or installing code from affected repositories could trigger malware execution.


Detection and Mitigation


Organizations are advised to:


* Carefully audit GitHub repository changes


* Use robust token management practices


* Implement strict extension validation


* Monitor for unusual force-push activities


Sources


  • https://thehackernews.com/2026/03/glassworm-attack-uses-stolen-github.html

  • https://x.com/TheCyberSecHub/status/2033631785251442730

  • https://www.reddit.com/r/SecOpsDaily/comments/1rvkgxx/glassworm_attack_uses_stolen_github_tokens_to/

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page