radar

ONE Sentinel

securitySecurity/THREATS/CRIT

GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos

sourceThe Hacker News
calendar_todayMarch 16, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

GlassWorm Attack Compromises Python Repos via Stolen GitHub Tokens

Summary

The GlassWorm malware campaign is exploiting stolen GitHub tokens to inject malicious code into Python repositories. This attack affects various Python projects by appending obfuscated code to critical files.

Key Points

  • The attack is specifically targeting Python projects, including Django apps, ML research code, Streamlit dashboards, and PyPI packages.
  • Malicious code is appended to files such as setup.py, main.py, and app.py.
  • The attack leverages stolen GitHub tokens to force-push malware into repositories.
  • The campaign is ongoing and affects hundreds of Python repositories.

Analysis

The GlassWorm attack highlights a significant vulnerability in the security of software repositories, particularly those hosted on GitHub. By using stolen tokens, attackers can bypass authentication mechanisms and directly inject malicious code into widely used Python projects. This poses a critical threat to developers and organizations relying on these repositories for their software development and deployment processes.

Conclusion

IT professionals should immediately review their GitHub token security practices and ensure that tokens are stored securely and rotated regularly. Additionally, developers should verify the integrity of their Python project files and consider implementing automated security checks to detect unauthorized changes.