GlassWorm Force-Push Attacks and AI Secret Surges [Prime Cyber Insights]
GlassWorm Force-Push Attacks and AI Secret Surges [Prime Cyber Insights]
Prime Cyber Insights

GlassWorm Force-Push Attacks and AI Secret Surges [Prime Cyber Insights]

This briefing examines a massive 81% surge in AI-service secret leaks reported by GitGuardian, alongside the emergence of the ForceMemo campaign. This new offshoot of the GlassWorm malware leverages stolen GitHub tokens to force-push malicious code into P

Episode E1220
March 17, 2026
03:33
Hosts: Neural Newscast
News
GlassWorm
ForceMemo
GitHub
Python security
AI secret leaks
GitGuardian
CISA KEV
Wing FTP
Hyrax infostealer
SEO poisoning
VS Code extensions
supply chain attack
PrimeCyberInsights

Now Playing: GlassWorm Force-Push Attacks and AI Secret Surges [Prime Cyber Insights]

Download size: 6.5 MB

Share Episode

SubscribeListen on Transistor

Episode Summary

This briefing examines a massive 81% surge in AI-service secret leaks reported by GitGuardian, alongside the emergence of the ForceMemo campaign. This new offshoot of the GlassWorm malware leverages stolen GitHub tokens to force-push malicious code into Python repositories, bypassing standard pull request trails. We also analyze CISA's addition of a Wing FTP vulnerability to the Known Exploited Vulnerabilities catalog and a sophisticated SEO poisoning campaign delivering the Hyrax infostealer via spoofed VPN installers. These incidents highlight a critical shift in supply chain threats where attackers are now manipulating repository history and leveraging malicious development environment extensions like VS Code to gain initial access.

Subscribe so you don't miss the next episode

Show Notes

In this episode of Prime Cyber Insights, we break down the latest GitGuardian research showing that 29 million secrets were leaked on public GitHub last year, with a specific focus on the vulnerability of AI-service credentials. We transition into the technical mechanics of the GlassWorm 'ForceMemo' campaign, which uses compromised developer credentials to rewrite Git history and inject malware into Python projects. The briefing also covers CISA’s latest KEV update regarding Wing FTP and a warning from Malwarebytes about SEO poisoning attacks targeting remote workers seeking VPN clients. Practitioners will find actionable insights on repository integrity and the risks of transitive distribution models in the npm ecosystem.

Topics Covered

  • ⚠️ GlassWorm Force-Push Injections: How attackers are rewriting Git history to inject malware without leaving a pull request trail.
  • 🔒 AI Secret Leak Surge: Analysis of the 81% increase in exposed credentials for AI services on public repositories.
  • 🌐 Wing FTP Vulnerability: CISA flags CVE-2025-47813 for active exploitation facilitating remote code execution.
  • 🚨 Hyrax Infostealer via SEO: How search engine poisoning is being used to deliver credential stealers through fake VPN installers.
  • 🛡️ Supply Chain Resilience: Evaluating the impact of malicious VS Code and Cursor extensions on developer security.

Note: This podcast is for informational purposes only and does not constitute professional security or legal advice.

Neural Newscast is AI-assisted, human reviewed. View our AI Transparency Policy at NeuralNewscast.com.

  • (00:11) - Introduction
  • (00:40) - Conclusion
  • (00:40) - Wing FTP and VPN Phishing Threats

Transcript

Full Transcript Available
[00:00] Announcer: From Neural Newscast, this is Prime Cyber Insights, Intelligence for Defenders, [00:04] Announcer: Leaders, and Decision Makers. [00:11] Aaron Cole: Welcome to Prime Cyber Insights for March 17th. [00:15] Lauren Mitchell: We're opening today with a critical shift in how attackers are compromising the software supply chain through GitHub and AI services. [00:24] Aaron Cole: Lauren, the data from Git Guardian is striking. [00:27] Aaron Cole: They've reported an 81% surge in AI service leaks this year, contributing to 29 million secrets hitting public GitHub. [00:36] Aaron Cole: But the real story is what happens once those credentials are in the wrong hands. [00:40] Lauren Mitchell: Exactly, Aaron. [00:42] Lauren Mitchell: We're tracking a campaign codenamed Force Memo, an offshoot of the Glassworm malware. [00:47] Lauren Mitchell: Attackers are using stolen GitHub tokens to force push malicious code into Python repositories. [00:54] Lauren Mitchell: They aren't just adding files. [00:56] Lauren Mitchell: They're rebasing legitimate commits to inject obfuscated malware into setup.py and main.py files. [01:04] Aaron Cole: The technical tradecraft here is worth noting. [01:07] Aaron Cole: By force pushing to the default branch, they rewrite Git history, [01:11] Aaron Cole: meaning there is no pull request or commit trail in the UI for maintainers the spot. [01:16] Aaron Cole: This campaign has already hit over 150 repositories [01:20] Aaron Cole: and even briefly compromised two React Native NPM packages. [01:25] Lauren Mitchell: It's a sophisticated entry vector, too. [01:27] Lauren Mitchell: They're acquiring these tokens by compromising developer systems through malicious VS code and cursor extensions. [01:35] Lauren Mitchell: For practitioners, this highlights that the development environment itself is now a high-priority target for secret exfiltration. [01:43] Aaron Cole: Turning to infrastructure vulnerabilities, CISA added a wing FTP flaw to its known Exploited Vulnerabilities Catalog. [01:51] Aaron Cole: CVE 2025-47813 is an information disclosure bug that leaks server paths, which attackers are using to facilitate a much more critical remote code execution flaw. [02:04] Lauren Mitchell: That's a vital connection, Aaron. [02:06] Lauren Mitchell: While the path leak is only a medium severity on its own, [02:09] Lauren Mitchell: its role in enabling RCE makes it a priority. [02:13] Lauren Mitchell: Federal agencies have until March 30 to patch. [02:16] Lauren Mitchell: It's a reminder that even low-impact info leaks [02:19] Lauren Mitchell: are often the first step in a larger kill chain. [02:22] Aaron Cole: Finally, malware bytes is warning about SEO poisoning targeting remote workers. [02:27] Aaron Cole: Users searching for remote VPN clients are being served high-ranking fake sites that deliver the high-racks info stealer. [02:35] Aaron Cole: The malware is even signed with a certificate to bypass local security checks before stealing work login details. [02:41] Lauren Mitchell: The deceptive part is that the malware actually installs a legitimate VPN client after the infection to avoid suspicion. [02:50] Lauren Mitchell: Aaron, this reinforces the need for organizations to mandate that all software be sourced exclusively from internal portals or direct vendor downloads. [02:59] Aaron Cole: That concludes our briefing for today. For the full technical breakdown, visit pci.neuralnewscast.com. Stay vigilant. [03:09] Lauren Mitchell: This briefing is for informational purposes only. [03:12] Lauren Mitchell: For specific risk management, consult your security team or legal counsel. [03:17] Lauren Mitchell: Neural Newscast is AI-assisted, human-reviewed. [03:20] Lauren Mitchell: View our AI transparency policy at neuralnewscast.com. [03:25] Lauren Mitchell: See you next time. [03:26] Announcer: This has been Prime Cyber Insights on Neural Newscast. [03:29] Announcer: Intelligence for defenders, leaders, and decision makers.

✓ Full transcript loaded from separate file: transcript.txt

Loading featured stories...