Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ForceMemo Campaign Exploits GitHub for Malware Injection

ForceMemo Campaign Exploits GitHub for Malware Injection

Posted on March 16, 2026 By CWS

Cyber attackers have been leveraging stolen credentials from the GlassWorm campaign to infiltrate GitHub accounts, embedding malware in Python repositories, according to StepSecurity. The ForceMemo campaign has predominantly targeted Python projects, including Django applications and machine learning research code, with the primary aim of stealing cryptocurrency and sensitive data.

Methods of Infiltration

Since March 8, attackers have exploited compromised developer credentials to rebase legitimate commits on the default branch of targeted repositories. They inject obscured malicious code and force-push these commits without altering the original commit message and author date, leaving minimal traces of compromise. This method of injection ensures a high level of stealth in their operations.

StepSecurity’s findings indicate that when an account with multiple repositories is breached, all projects under that account get infected. The injected code checks system settings and bypasses machines set to Russian, suggesting an Eastern European origin of the operation.

Malware Operation and Impact

The malware interacts with a specific Solana blockchain address to retrieve transaction memos, which contain instructions. It then fetches, decrypts, and executes an encrypted JavaScript payload, establishing persistence on the target system. The attackers possess the private key associated with this cryptocurrency address, using Solana’s Memo program to disseminate instructions.

The first transaction linked to this address occurred on November 27, 2025, indicating that the campaign’s groundwork was laid months prior to its execution. With 50 transactions recorded, the attackers frequently updated the payload URL, suggesting a shift in targeting strategy from other infection vectors to GitHub repositories.

Wider Implications and GlassWorm Activities

The GlassWorm malware, previously known for using Unicode variation selectors to hide code and evade detection, has resurfaced in various forms. Initially emerging in October 2025 through supply chain attacks on Visual Studio developers, it was quickly contained. However, a resurgence in November targeted VS Code extensions, impacting users via auto-updated extensions.

Recent activities indicate that GlassWorm is actively compromising VS Code extensions and expanding its reach to NPM and GitHub. This coordinated effort involves deploying standalone extensions that later become vehicles for malware delivery. Over 70 extensions have been removed from the Open VSX registry, having been identified as part of this campaign.

As these attacks continue, the cybersecurity community remains vigilant, emphasizing the need for developers to enhance their security measures and remain updated about potential threats.

Security Week News Tags:crypto theft, Cybersecurity, developer credentials, ForceMemo, GitHub, GlassWorm, Malware, Python repositories, Solana blockchain, VS Code

Post navigation

Previous Post: Agentic AI Revolutionizes Security Validation
Next Post: Android 17 Enhances Security with Advanced Protection

Related Posts

Legitimate Shellter Pen-Testing Tool Used in Malware Attacks Legitimate Shellter Pen-Testing Tool Used in Malware Attacks Security Week News
FBI Aware of 900 Organizations Hit by Play Ransomware FBI Aware of 900 Organizations Hit by Play Ransomware Security Week News
In Other News: Paid for Being Jailed, Google’s M Settlement, CISA Chief’s ChatGPT Leak In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak Security Week News
Tea App Takes Messaging System Offline After Second Security Issue Reported Tea App Takes Messaging System Offline After Second Security Issue Reported Security Week News
GitHub Copilot Chat Flaw Leaked Data From Private Repositories GitHub Copilot Chat Flaw Leaked Data From Private Repositories Security Week News
ConductorOne Raises  Million in Series B Funding ConductorOne Raises $79 Million in Series B Funding Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Global Outage Disrupts Microsoft Exchange Online Access
  • GlassWorm Malware Exploits GitHub Tokens for Python Attacks
  • Fake FileZilla Sites Distribute Remote Access Trojan
  • Qihoo 360’s SSL Key Leak: Major Security Breach
  • AI-Driven Malware ‘Slopoly’ Fuels Hive0163 Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Global Outage Disrupts Microsoft Exchange Online Access
  • GlassWorm Malware Exploits GitHub Tokens for Python Attacks
  • Fake FileZilla Sites Distribute Remote Access Trojan
  • Qihoo 360’s SSL Key Leak: Major Security Breach
  • AI-Driven Malware ‘Slopoly’ Fuels Hive0163 Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News