Threat IntelHIGH

Invisible Code Supply-Chain Attack Hits GitHub Repositories

ARArs Technica Security
GitHubAikido SecurityGlasswormUnicodeNPM
🎯

Basically, hackers are hiding bad code in packages that look normal to developers.

Quick Summary

A new supply-chain attack is flooding repositories with invisible code. GitHub and other platforms are affected. Developers must be vigilant against these sophisticated threats to protect their projects.

What Happened

Recently, researchers from Aikido Security uncovered a supply-chain attack targeting popular code repositories like GitHub, NPM, and Open VSX. This attack involved the distribution of 151 malicious packages containing code that is invisible to the human eye. These packages were uploaded between March 3 and March 9, and they exploit a technique that has been largely overlooked until now: the use of invisible Unicode? characters. This method allows attackers to embed malicious code in a way that traditional defenses struggle to detect.

The attackers, dubbed Glassworm, have cleverly crafted these packages to resemble legitimate ones. This tactic is not new, but the use of invisible code adds a significant layer of complexity. Developers reviewing the code may see nothing suspicious, as the malicious functions are hidden within Unicode? characters that render them invisible in most text editors and code review tools. This makes it incredibly challenging for developers to spot the threat before it’s too late.

Who's Behind It

The Glassworm group is suspected to be leveraging large language models (LLMs) to generate these convincing packages. The researchers noted that the high quality of the visible code makes it appear legitimate, with surrounding changes mimicking standard documentation tweaks and bug fixes. This sophistication raises alarms, as it indicates that the attackers are employing advanced techniques to bypass traditional security measures.

Aikido Security's findings suggest that the malicious packages? are only a fraction of a larger campaign, with many already deleted from the repositories. Fellow security firm Koi has also been tracking this group, reinforcing the belief that AI tools are being utilized to enhance the attack's effectiveness. The implications of AI in crafting these packages could mean that future attacks will become even harder to detect.

Tactics & Techniques

The invisible code is crafted using Public Use Areas in the Unicode? specification, which allows for the creation of characters that are not visible to humans. When the code is executed, it can trigger harmful actions without any visible signs during code reviews. For instance, a small decoder function can extract these hidden bytes and execute them, leading to the execution of malicious payloads.

In one analyzed package, this technique was used to fetch and execute a second-stage script capable of stealing sensitive information such as tokens and credentials. The researchers highlighted how past incidents have shown the potential for these attacks to escalate quickly, especially as attackers refine their methods.

Defensive Measures

To protect against such sophisticated supply-chain attack?s, developers must adopt a more rigorous approach to package inspection. This includes:

  • Scrutinizing package names for typos or anomalies.
  • Reviewing dependencies closely before integrating them into projects.
  • Staying informed about the latest tactics employed by threat actors, particularly those involving AI-generated content.

As the threat landscape evolves, vigilance is key. Developers should be aware that malicious packages? may increasingly appear legitimate, especially when they utilize invisible Unicode? characters to conceal their true nature. Continuous education and proactive security measures will be essential in combating these emerging threats.

💡 Tap dotted terms for explanations

🔒 Pro insight: The use of invisible Unicode characters represents a significant evolution in supply-chain attack techniques, complicating traditional detection methods.

Original article from

Ars Technica Security · Dan Goodin

Read Full Article

Related Pings

HIGHThreat Intel

AI Phishing Attacks Surge with Malicious SVGs Post-Holiday

AI phishing attacks have surged post-holidays, with a 50-fold increase in malicious SVGs. Many users are affected as attackers impersonate trusted entities. This evolving threat highlights the need for enhanced email security measures.

SC Media·
HIGHThreat Intel

Europol Shuts Down Major Phishing Platform: Tycoon 2FA

Europol and vendors have taken down the Tycoon 2FA phishing platform. This operation disrupts a major threat to users. Stay alert and protect your data from phishing scams.

Proofpoint Threat Insight·
HIGHThreat Intel

Pro-Iran Hackers Target Major US Medical Device Maker Stryker

A cyberattack by pro-Iran hackers has disrupted Stryker, a key US medical device maker. This incident raises concerns about patient care and cybersecurity in the healthcare sector. Experts are calling for improved defenses against such nation-state threats.

Proofpoint Threat Insight·
HIGHThreat Intel

Iran Launches Major Cyberattack on U.S. Medical Tech Firm Stryker

Iran's Handala Team has launched a significant cyberattack on Stryker, disrupting operations. This marks a new escalation in cyber warfare amid ongoing tensions. Companies must enhance their defenses against such threats.

Proofpoint Threat Insight·
MEDIUMThreat Intel

Cyberattack Thwarted at Poland's Nuclear Research Centre

Hackers targeted Poland's National Centre for Nuclear Research but were stopped in their tracks. No data was compromised, and operations continued normally. The incident raises concerns about potential state-sponsored attacks, particularly from Iran.

Security Affairs·
MEDIUMThreat Intel

Nonprofits Under Siege: Cyber Incidents Remain Unreported

Nonprofits are increasingly targeted by cybercriminals, yet many incidents go unreported. This lack of data obscures the real risks they face. Strengthening cybersecurity in this sector is crucial for protecting sensitive information and community trust.

Dark Reading·