When Attackers Go Legitimate: The GlassWorm Campaign Shows Us the Future of Supply Chain Attacks
When Attackers Go Legitimate: The GlassWorm Campaign Shows Us the Future of Supply Chain Attacks
We’ve seen plenty of supply chain attacks over the years, but the GlassWorm campaign that surfaced this week represents something particularly unsettling. Instead of compromising build systems or exploiting vulnerabilities, these attackers are using stolen GitHub tokens to directly force-push malware into Python repositories. It’s brazenly simple and terrifyingly effective.
The GlassWorm Playbook: Why This Matters
What makes GlassWorm different is how the attackers are hiding in plain sight. According to The Hacker News, they’re targeting Django apps, ML research code, Streamlit dashboards, and PyPI packages by appending obfuscated code to commonly used files like setup.py, main.py, and app.py.