Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor
Uptime Monitor

Invisible Unicode Malware Hits GitHub and Repositories

Image © Arstechnica
A wave of supply-chain attacks uses invisible Unicode payloads to infiltrate popular code repositories, challenging traditional defenses. Ai-based tooling and high-fidelity, hard-to-detect packages were identified across platforms.

Researchers from Aikido Security disclosed a wave of supply-chain attacks that inject malicious packages whose payload is hidden in Unicode characters invisible to human reviewers and common code editors.

In a seven-day window in early March, they identified 151 such packages uploaded to GitHub, with similar activity detected in npm and Open VSX.

The technique relies on visible code that looks legitimate at first glance; the real malicious payload is encoded in Unicode characters that editors treat as whitespace, leaving defenders unaware during review.

Aikido researchers say the attacker group, nicknamed Glassworm, appears to be using large language models to generate bespoke code changes across multiple projects, enabling a scale that would be impractical to craft manually.

Security firms note that such invisibly encoded payloads complicate traditional defenses, prompting calls for stricter dependency scrutiny and improved tooling to detect hidden characters and suspicious package naming.

 

Arstechnica

Notícias relacionadas

Claro planeja adquirir rede de fibra na Colômbia
Testes confirmam convivência 5G Broadcast com redes móveis
IA física pressiona redes móveis por uplink
IA física nas telecomunicações: disputa de domínio
Ericsson: avanços de APIs e SA lentos
Teste de 5G Broadcast leva TV a celulares

O ISP.Tools sobrevive graças aos anúncios.

Considere desativar seu bloqueador de anúncios.
Prometemos não ser intrusivos.

Consentimento para cookies

Utilizamos cookies para melhorar a sua experiência no nosso site.

Ao utilizar o nosso site, você concorda com o uso de cookies. Saiba mais