Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ForceMemo Campaign Exploits GitHub for Malware Injection

ForceMemo Campaign Exploits GitHub for Malware Injection

Posted on March 16, 2026 By CWS

Cyber attackers have been leveraging stolen credentials from the GlassWorm campaign to infiltrate GitHub accounts, embedding malware in Python repositories, according to StepSecurity. The ForceMemo campaign has predominantly targeted Python projects, including Django applications and machine learning research code, with the primary aim of stealing cryptocurrency and sensitive data.

Methods of Infiltration

Since March 8, attackers have exploited compromised developer credentials to rebase legitimate commits on the default branch of targeted repositories. They inject obscured malicious code and force-push these commits without altering the original commit message and author date, leaving minimal traces of compromise. This method of injection ensures a high level of stealth in their operations.

StepSecurity’s findings indicate that when an account with multiple repositories is breached, all projects under that account get infected. The injected code checks system settings and bypasses machines set to Russian, suggesting an Eastern European origin of the operation.

Malware Operation and Impact

The malware interacts with a specific Solana blockchain address to retrieve transaction memos, which contain instructions. It then fetches, decrypts, and executes an encrypted JavaScript payload, establishing persistence on the target system. The attackers possess the private key associated with this cryptocurrency address, using Solana’s Memo program to disseminate instructions.

The first transaction linked to this address occurred on November 27, 2025, indicating that the campaign’s groundwork was laid months prior to its execution. With 50 transactions recorded, the attackers frequently updated the payload URL, suggesting a shift in targeting strategy from other infection vectors to GitHub repositories.

Wider Implications and GlassWorm Activities

The GlassWorm malware, previously known for using Unicode variation selectors to hide code and evade detection, has resurfaced in various forms. Initially emerging in October 2025 through supply chain attacks on Visual Studio developers, it was quickly contained. However, a resurgence in November targeted VS Code extensions, impacting users via auto-updated extensions.

Recent activities indicate that GlassWorm is actively compromising VS Code extensions and expanding its reach to NPM and GitHub. This coordinated effort involves deploying standalone extensions that later become vehicles for malware delivery. Over 70 extensions have been removed from the Open VSX registry, having been identified as part of this campaign.

As these attacks continue, the cybersecurity community remains vigilant, emphasizing the need for developers to enhance their security measures and remain updated about potential threats.

Security Week News Tags:crypto theft, Cybersecurity, developer credentials, ForceMemo, GitHub, GlassWorm, Malware, Python repositories, Solana blockchain, VS Code

Post navigation

Previous Post: Agentic AI Revolutionizes Security Validation
Next Post: Android 17 Enhances Security with Advanced Protection

Related Posts

The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn Security Week News
Two-Year-Old Ray AI Framework Flaw Exploited in Ongoing Campaign Two-Year-Old Ray AI Framework Flaw Exploited in Ongoing Campaign Security Week News
Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility Denmark Blames Russia for Cyberattacks Ahead of Elections and on Water Utility Security Week News
Rowhammer Attack Demonstrated Against Nvidia GPU Rowhammer Attack Demonstrated Against Nvidia GPU Security Week News
Meta Paid Out  Million via Bug Bounty Program in 2025 Meta Paid Out $4 Million via Bug Bounty Program in 2025 Security Week News
Armenian Suspect in RedLine Malware Case Extradited to US Armenian Suspect in RedLine Malware Case Extradited to US Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 40,000 Servers at Risk Due to cPanel Exploit
  • AI Accelerates Zero-Day Exploits, Increasing Cyber Risks
  • Instructure Faces Cyberattack, Data Breach Reported
  • Global Crypto Scam Crackdown: 276 Arrests, $701M Seized
  • Microsoft Defender Misidentifies DigiCert Certificates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 40,000 Servers at Risk Due to cPanel Exploit
  • AI Accelerates Zero-Day Exploits, Increasing Cyber Risks
  • Instructure Faces Cyberattack, Data Breach Reported
  • Global Crypto Scam Crackdown: 276 Arrests, $701M Seized
  • Microsoft Defender Misidentifies DigiCert Certificates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark