Malware & RansomwareHIGH

Malware - ForceMemo Compromises GitHub Accounts and Repos

CSCyber Security News
🎯

Basically, a new malware is taking over GitHub accounts and hiding bad code in Python projects.

Quick Summary

A new malware called ForceMemo is hijacking GitHub accounts and injecting malicious code into Python repositories. Hundreds of developers are affected, risking their projects and data. It's crucial for developers to monitor their accounts and repositories closely to avoid falling victim to this stealthy attack.

What Happened

A new malware campaign, dubbed ForceMemo, is stealthily compromising hundreds of GitHub accounts. This attack injects hidden malicious code into Python repositories, making it difficult for developers to detect. The earliest confirmed infections date back to March 8, 2026, and the campaign is still ongoing, with new repositories being compromised daily. The malware targets a wide range of Python projects, including popular frameworks like Django and Flask, as well as machine learning and API packages.

The attackers utilize Git's force-push command to overwrite repository history without leaving visible traces. By appending obfuscated malicious code to key Python files like setup.py and main.py, they ensure that developers unwittingly trigger the malware when they clone or install affected packages. This method allows the attackers to maintain a low profile while executing their malicious activities.

Who's Being Targeted

The ForceMemo campaign has impacted a broad spectrum of developers working on various Python projects. Notable accounts like BierOne, wecode-bootcamp-korea, and HydroRoll-Team have reported multiple repository compromises. Each account can have several repositories infected, showcasing how a single stolen credential can lead to widespread exposure across a developer's work.

The malware's reach extends to many open-source projects, making it one of the most significant supply chain attacks targeting the Python ecosystem in recent months. As this campaign continues to evolve, developers need to stay vigilant and monitor their repositories closely.

Signs of Infection

Infected repositories exhibit specific signs of tampering, such as mismatches between the original author date and the actual committer date. The attacker preserves the original commit message and author details, making it challenging to detect the intrusion. The only clear indicator is the committer email, which is often set to the string "null".

Additionally, the malware employs multiple layers of obfuscation, including base64 decoding and XOR decryption, to hide its true intent. Developers should search for the marker variable lzcdrtfxyqiplpd in their cloned Python files and check for unexpected files like ~/init.json to identify potential infections.

How to Protect Yourself

To safeguard against the ForceMemo malware, developers should take proactive measures. First, confirm that the default branch of your repositories matches the last known legitimate commit. Pay attention to any discrepancies in commit dates and author information. Regularly review your GitHub account for any unauthorized access or changes.

Moreover, be cautious when installing packages from repositories, especially if they have been recently modified. If you suspect your account has been compromised, change your GitHub credentials immediately and consider using two-factor authentication for added security. By staying informed and vigilant, developers can better protect themselves against this evolving threat.

🔒 Pro insight: The use of force-push for silent code injection highlights a critical vulnerability in repository management practices, necessitating stricter access controls.

Original article from

Cyber Security News · Tushar Subhra Dutta

Read Full Article

Related Pings

HIGHMalware & Ransomware

Ransomware - Marquis Reports Data Theft of 672K Individuals

Marquis, a Texas financial services firm, suffered a ransomware attack affecting over 670,000 individuals. The breach compromised sensitive personal data, raising serious security concerns. Affected individuals should monitor their accounts closely and take protective measures.

BleepingComputer·
HIGHMalware & Ransomware

Malware - New Campaigns Turn Devices Into DDoS and Mining Bots

New malware campaigns are hijacking network devices for DDoS attacks and crypto-mining. Routers and IoT devices are at risk, making immediate action essential. Protect your infrastructure to avoid exploitation.

Cyber Security News·
HIGHMalware & Ransomware

Malware - Iranian Hackers Used Stolen Credentials in Stryker Breach

A significant cyberattack on Stryker by Iranian hackers has disrupted operations globally. The attackers exploited stolen credentials, raising serious security concerns. Stryker is working to restore affected systems while authorities investigate the breach.

SecurityWeek·
HIGHMalware & Ransomware

Vidar Stealer 2.0 - Malware Delivered via Fake Game Cheats

A new malware campaign is exploiting fake game cheats on GitHub and Reddit to deliver Vidar 2.0. Gamers are at risk as they unknowingly install this dangerous infostealer. Stay informed and protect your data from these evolving threats.

Infosecurity Magazine·
HIGHMalware & Ransomware

Malware - GlassWorm Campaign Targets Python Repos via GitHub

A new malware campaign, ForceMemo, is targeting Python repositories on GitHub using stolen developer tokens. This poses a significant risk to developers and users alike. Vigilance is crucial to prevent compromise.

SC Media·
HIGHMalware & Ransomware

GlassWorm Malware - Major Attack Hits GitHub and npm Repos

A new wave of GlassWorm malware has compromised over 400 code repositories on GitHub and npm. Developers are at risk of losing sensitive data. Stay vigilant and check for signs of infection to protect your projects.

BleepingComputer·