{"id":12765,"date":"2026-03-16T00:16:56","date_gmt":"2026-03-16T00:16:56","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=12765"},"modified":"2026-03-16T00:16:56","modified_gmt":"2026-03-16T00:16:56","slug":"provide-chain-assault-utilizing-invisible-code-hits-github-and-different-repositories","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=12765","title":{"rendered":"Provide-chain assault utilizing invisible code hits GitHub and different repositories"},"content":{"rendered":"<p> <br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/10\/hidden-eye-1152x648.jpg\" \/><\/p>\n<p>Researchers say they\u2019ve found a supply-chain assault flooding repositories with malicious packages that comprise invisible code, a method that\u2019s flummoxing conventional defenses designed to detect such threats.<\/p>\n<p>The researchers, from agency Aikido Safety, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.aikido.dev\/blog\/glassworm-returns-unicode-attack-github-npm-vscode\">mentioned Friday<\/a> that they discovered 151 malicious packages that had been uploaded to GitHub from March 3 to March 9. Such supply-chain assaults have been widespread for <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/information-technology\/2018\/10\/two-new-supply-chain-attacks-come-to-light-in-less-than-a-week\/\">almost<\/a> a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/information-technology\/2018\/11\/hacker-backdoors-widely-used-open-source-software-to-steal-bitcoin\/\">decade<\/a>. They often work by importing malicious packages with code and names that carefully resemble these of extensively used code libraries, with the target of tricking builders into mistakenly incorporating the previous into their software program. In some instances, these malicious packages are downloaded hundreds of instances.<\/p>\n<h2>Defenses see nothing. Decoders see executable code<\/h2>\n<p>The packages Aikido discovered this month have adopted a more recent method: selective use of code that isn\u2019t seen when loaded into just about all editors, terminals, and code evaluate interfaces. Whereas many of the code seems in regular, readable type, malicious features and payloads\u2014the same old telltale indicators of malice\u2014are rendered in unicode characters which are invisible to the human eye. The tactic, which Aikido mentioned it <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.aikido.dev\/blog\/youre-invited-delivering-malware-via-google-calendar-invites-and-puas\">first noticed<\/a> final 12 months, makes handbook code evaluations and different conventional defenses almost ineffective. Different repositories hit in these assaults embody NPM and Open VSX.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/security\/2026\/03\/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories\/\">Learn full article<\/a><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/arstechnica.com\/security\/2026\/03\/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories\/#comments\">Feedback<\/a><\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>Researchers say they\u2019ve found a supply-chain assault flooding repositories with malicious packages that comprise invisible code, a method that\u2019s flummoxing conventional defenses designed to detect such threats. The researchers, from agency Aikido Safety, mentioned Friday that they discovered 151 malicious packages that had been uploaded to GitHub from March 3 to March 9. Such supply-chain [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":12767,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[717,977,933,1017,8251,3474,8250],"class_list":["post-12765","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-news","tag-attack","tag-code","tag-github","tag-hits","tag-invisible","tag-repositories","tag-supplychain"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12765"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12765\/revisions"}],"predecessor-version":[{"id":12766,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/12765\/revisions\/12766"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/12767"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 15:01:04 UTC -->