Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ForceMemo Campaign Exploits GitHub for Malware Injection

ForceMemo Campaign Exploits GitHub for Malware Injection

Posted on March 16, 2026 By CWS

Cyber attackers have been leveraging stolen credentials from the GlassWorm campaign to infiltrate GitHub accounts, embedding malware in Python repositories, according to StepSecurity. The ForceMemo campaign has predominantly targeted Python projects, including Django applications and machine learning research code, with the primary aim of stealing cryptocurrency and sensitive data.

Methods of Infiltration

Since March 8, attackers have exploited compromised developer credentials to rebase legitimate commits on the default branch of targeted repositories. They inject obscured malicious code and force-push these commits without altering the original commit message and author date, leaving minimal traces of compromise. This method of injection ensures a high level of stealth in their operations.

StepSecurity’s findings indicate that when an account with multiple repositories is breached, all projects under that account get infected. The injected code checks system settings and bypasses machines set to Russian, suggesting an Eastern European origin of the operation.

Malware Operation and Impact

The malware interacts with a specific Solana blockchain address to retrieve transaction memos, which contain instructions. It then fetches, decrypts, and executes an encrypted JavaScript payload, establishing persistence on the target system. The attackers possess the private key associated with this cryptocurrency address, using Solana’s Memo program to disseminate instructions.

The first transaction linked to this address occurred on November 27, 2025, indicating that the campaign’s groundwork was laid months prior to its execution. With 50 transactions recorded, the attackers frequently updated the payload URL, suggesting a shift in targeting strategy from other infection vectors to GitHub repositories.

Wider Implications and GlassWorm Activities

The GlassWorm malware, previously known for using Unicode variation selectors to hide code and evade detection, has resurfaced in various forms. Initially emerging in October 2025 through supply chain attacks on Visual Studio developers, it was quickly contained. However, a resurgence in November targeted VS Code extensions, impacting users via auto-updated extensions.

Recent activities indicate that GlassWorm is actively compromising VS Code extensions and expanding its reach to NPM and GitHub. This coordinated effort involves deploying standalone extensions that later become vehicles for malware delivery. Over 70 extensions have been removed from the Open VSX registry, having been identified as part of this campaign.

As these attacks continue, the cybersecurity community remains vigilant, emphasizing the need for developers to enhance their security measures and remain updated about potential threats.

Security Week News Tags:crypto theft, Cybersecurity, developer credentials, ForceMemo, GitHub, GlassWorm, Malware, Python repositories, Solana blockchain, VS Code

Post navigation

Previous Post: Agentic AI Revolutionizes Security Validation
Next Post: Android 17 Enhances Security with Advanced Protection

Related Posts

Imper.ai Emerges From Stealth Mode With  Million in Funding Imper.ai Emerges From Stealth Mode With $28 Million in Funding Security Week News
Inside the 1 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next Inside the $111 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next Security Week News
Eurail Breach Affects 300,000 Customers’ Data Eurail Breach Affects 300,000 Customers’ Data Security Week News
Why Sincerity Is a Strategic Asset in Cybersecurity Why Sincerity Is a Strategic Asset in Cybersecurity Security Week News
Hackers Start Exploiting Critical Cisco ISE Vulnerabilities Hackers Start Exploiting Critical Cisco ISE Vulnerabilities Security Week News
In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding Bias In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding Bias Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing
  • AiTM Phishing Attacks Target SaaS Platforms
  • Trellix Reports Source Code Breach Incident

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing
  • AiTM Phishing Attacks Target SaaS Platforms
  • Trellix Reports Source Code Breach Incident

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark