Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

Invisible Unicode Malware Hits GitHub and Repositories

Image © Arstechnica
A wave of supply-chain attacks uses invisible Unicode payloads to infiltrate popular code repositories, challenging traditional defenses. Ai-based tooling and high-fidelity, hard-to-detect packages were identified across platforms.

Researchers from Aikido Security disclosed a wave of supply-chain attacks that inject malicious packages whose payload is hidden in Unicode characters invisible to human reviewers and common code editors.

In a seven-day window in early March, they identified 151 such packages uploaded to GitHub, with similar activity detected in npm and Open VSX.

The technique relies on visible code that looks legitimate at first glance; the real malicious payload is encoded in Unicode characters that editors treat as whitespace, leaving defenders unaware during review.

Aikido researchers say the attacker group, nicknamed Glassworm, appears to be using large language models to generate bespoke code changes across multiple projects, enabling a scale that would be impractical to craft manually.

Security firms note that such invisibly encoded payloads complicate traditional defenses, prompting calls for stricter dependency scrutiny and improved tooling to detect hidden characters and suspicious package naming.

 

Arstechnica

Related News

Greenlight expands fiber builds NE Pennsylvania
Stryker Windows Attack: Who, What, Why
GFiber to Merge with Astound Broadband
Spectrum Expands RingCentral Partnership
Connectivity: The True Foundation of Smart Communities
KadNap: Takedown-Resistant Router Botnet Uncovered

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more