HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

GlassWorm Malware Uses Stolen GitHub Tokens to Inject Malicious Code into Hundreds of Python Repositories

GlassWorm leverages compromised GitHub credentials to force‑push obfuscated malware into Python projects, threatening any organization that consumes affected open‑source packages. The attack highlights a critical supply‑chain risk for third‑party risk managers.

🛡️ LiveThreat™ Intelligence · 📅 March 17, 2026· 📰 thehackernews.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
5 sector(s)
Actions
4 recommended
📰
Source
thehackernews.com

GlassWorm Campaign Injects Malware into Hundreds of Python Repositories via Stolen GitHub Tokens

What Happened — Threat researchers observed the GlassWorm malware family using stolen GitHub personal‑access tokens to force‑push obfuscated malicious code into Python projects. The payload is appended to common entry‑point files such as setup.py, main.py and app.py across Django apps, machine‑learning research code, Streamlit dashboards, and PyPI packages.

Why It Matters for TPRM

  • Supply‑chain risk: compromised open‑source libraries can propagate malicious code to downstream customers.
  • Credential exposure: stolen developer tokens give attackers write access to repositories, bypassing traditional perimeter controls.
  • Broad impact: any organization that builds on or consumes affected Python packages may inherit the malware.

Who Is Affected — Technology SaaS, Cloud‑infrastructure providers, Financial services, Healthcare, Research institutions, and any other sector that relies on third‑party Python code.

Recommended Actions

  • Conduct an inventory of all third‑party Python dependencies and verify their integrity.
  • Enforce strict token policies: least‑privilege scopes, short‑lived tokens, and regular rotation.
  • Enable signed commits and enforce branch‑protection rules on critical repositories.
  • Deploy repository‑monitoring tools to detect unauthorized force‑pushes or anomalous commit activity.

Technical Notes — Attack vector: stolen GitHub tokens (likely obtained via phishing or credential dumping). No public CVE associated. Malicious code is obfuscated and executed when the compromised Python package is installed or run. Data types involved are source‑code files and potentially embedded secrets. Source: The Hacker News

📰 Original Source
https://thehackernews.com/2026/03/glassworm-attack-uses-stolen-github.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.