BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

GitHub Malware Steals Python Repos via Force-Pushing

Hackers force-push malware into Python repos via stolen GitHub tokens.

  • A GitHub account takeover campaign uses stolen tokens to inject malware into hundreds of Python repositories.
  • The malicious code, part of the GlassWorm/ForceMemo campaign, targets users who clone or install from compromised repos.
  • The payload retrieves instructions from a Solana wallet transaction memo, a signature linked to previous GlassWorm activity.
  • Attackers rewrite Git history via force-pushing, leaving no visible trail in GitHub’s interface.

On March 8, 2026, the cybersecurity firm StepSecurity uncovered a sophisticated attack campaign compromising hundreds of Python repositories on GitHub by force-pushing malicious code. Dubbed ForceMemo, this offshoot of the ongoing GlassWorm malware operation exploits stolen developer credentials to alter project files and infect downstream users.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

According to StepSecurity, the attackers target projects including Django apps and PyPI packages by appending obfuscated malware to key files. “Anyone who runs pip install from a compromised repo or clones and executes the code will trigger the malware,” the company said. This methodology rewrites Git history via rebasing, preserving original commit details to evade detection.

The injected payload contains checks to avoid systems with Russian locales. Consequently, it fetches its commands by querying the transaction memo of a specific Solana wallet previously linked to GlassWorm campaigns. This server then delivers encrypted JavaScript designed to steal cryptocurrency and sensitive data from victims.

Meanwhile, Socket noted the core threat actor has refined its techniques for improved evasion. The actor leverages extension dependencies in a transitive distribution model, as detailed in a previous report. Furthermore, Aikido Security attributed a separate mass repository compromise using invisible Unicode characters to the same actor.

The consistent use of the same Solana command infrastructure confirms ForceMemo is a new delivery vector for the established GlassWorm threat actor. StepSecurity emphasized the unique nature of this attack, stating “No other documented supply chain campaign uses this injection method” of silent force-pushing.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Micron Unveils Next-Gen HBM4, Boosts AI Memory Speeds

Micron Technology has begun volume shipments of its new HBM4 memory, designed for NVIDIA's...

Gamblers Threaten Israeli Reporter Over Bet Loss

Polymarket users allegedly threatened the life of an Israeli journalist, Emanuel Fabian, after his...

T. Rowe Price updates its active crypto ETF bid

T. Rowe Price has updated its prospectus for an actively managed crypto ETF, naming...

Alphabet’s AI Capex Spurred by Strong Cash Flow, Analysts Say

Alphabet (GOOGL) is significantly increasing its AI-focused capital spending, with analysts viewing this as...

IBM Expands Free Quantum Access Amid Bitcoin Fears

IBM expanded its free quantum computing program, giving researchers more runtime and access to...

Must Read

9 Best Books On Ethereum And Blockchain Technology

QUICK LINKSHow to Choose Your First Blockchain Book: A Simple Framework1. Define Your Goal: Are you looking to Build, Invest, or Understand?2. Assess Your...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading