IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

Invisible Unicode Malware Hits GitHub and Repositories

Image © Arstechnica
A wave of supply-chain attacks uses invisible Unicode payloads to infiltrate popular code repositories, challenging traditional defenses. Ai-based tooling and high-fidelity, hard-to-detect packages were identified across platforms.

Researchers from Aikido Security disclosed a wave of supply-chain attacks that inject malicious packages whose payload is hidden in Unicode characters invisible to human reviewers and common code editors.

In a seven-day window in early March, they identified 151 such packages uploaded to GitHub, with similar activity detected in npm and Open VSX.

The technique relies on visible code that looks legitimate at first glance; the real malicious payload is encoded in Unicode characters that editors treat as whitespace, leaving defenders unaware during review.

Aikido researchers say the attacker group, nicknamed Glassworm, appears to be using large language models to generate bespoke code changes across multiple projects, enabling a scale that would be impractical to craft manually.

Security firms note that such invisibly encoded payloads complicate traditional defenses, prompting calls for stricter dependency scrutiny and improved tooling to detect hidden characters and suspicious package naming.

 

Arstechnica

Related News

Mediacom Finishes Minnesota Fiber Build Ahead of Schedule
Ransomware Goes Quantum-Safe: Kyber Claims PQC
MDU Wi-Fi: Secure In-Room Connectivity
Vero Fiber Completes TEC Acquisition
Ezee Fiber Connects First Santa Fe Customers
Emergency ASP.NET Patch for macOS and Linux

ISP.Tools survives thanks to ads.

Consider disabling your ad blocker.
We promise not to be intrusive.

Cookie Consent

We use cookies to improve your experience on our site.

By using our site you consent to cookies. Learn more