Back to News
Cybersecurity

GlassWorm Campaign Exploits GitHub Tokens to Compromise Python Repositories

A new malware campaign, GlassWorm, utilizes stolen GitHub tokens to inject malicious code into numerous Python projects.

The GlassWorm attack has emerged as a significant threat in the cybersecurity landscape, exploiting stolen GitHub tokens to infect hundreds of Python repositories with malware. StepSecurity reports that the attack specifically targets various types of Python projects, including Django applications and machine learning code, by appending obfuscated malicious code to critical files such as setup.py, main.py, and app.py. This sophisticated method allows attackers to seamlessly integrate harmful code into legitimate projects, potentially impacting a wide range of software solutions that rely on Python.

For businesses, the implications are profound. Organizations that utilize Python for their applications must prioritize the security of their GitHub accounts, ensuring that access tokens are safeguarded and monitored for suspicious activity. Furthermore, regular code audits and the implementation of security best practices are essential to mitigate the risks posed by such attacks. The GlassWorm campaign underscores the growing intersection of cybersecurity and software development, highlighting the need for developers and security teams to collaborate closely to protect their ecosystems. As the threat landscape evolves, the responsibility of safeguarding intellectual property and user data becomes increasingly critical, particularly in an era where AI and machine learning are heavily reliant on open-source contributions.

---

*Originally reported by [The Hacker News](https://thehackernews.com/2026/03/glassworm-attack-uses-stolen-github.html)*