Article 74CWA Invisible Malicious Code Attacks 151 GitHub Repos And VS Code — Glassworm Attack Uses Blockchain

Invisible Malicious Code Attacks 151 GitHub Repos And VS Code — Glassworm Attack Uses Blockchain

by
jelizondo
from SoylentNews on (#74CWA)

Arthur T Knackerbracket writes:

https://www.tomshardware.com/tech-industry/cyber-security/malicious-packages-using-invisible-unicode-found-in-151-github-repos-and-vs-code

Aikido suggests that the 151 repos identified are likely a fraction of the total, since many had already been deleted before the research was published. Among the notable targets are repositories from Wasmer, Reworm, and anomalyco, the organization behind OpenCode and SST. The same decoder pattern also appeared in at least two npm packages and one VS Code extension uploaded on March 12.

Unfortunately, this most recent Glassworm campaign is harder to counter than previous iterations due to the sophistication of the malicious injections. Instead of showing up as obviously suspicious commits, they're taking the form of version bumps and small refactors that are stylistically consistent with each target project." Aikido says it suspects the attackers are using large language models to generate this cover, since manually creating 151 bespoke code changes across different codebases wouldn't be feasible otherwise.

Glassworm has been active since at least March 2025, when Aikido first found the invisible Unicode technique in malicious npm packages. By October, the same actor had moved into the Open VSX extension registry and GitHub repositories. An earlier investigation by Koi Security found the group used stolen npm, GitHub, and Git credentials to propagate the worm further, with decoded payloads deploying hidden VNC servers and SOCKS proxies for remote access. The Solana-based infrastructure makes takedown difficult, since blockchain transactions cannot be modified or deleted.

Aikido recommends scrutinizing package names and dependencies before incorporating them into projects, and using automated tooling that scans specifically for invisible Unicode characters, since visual code review doesn't protect this class of injection.

Original Submission

Read more of this story at SoylentNews.

External Content
Source RSS or Atom Feed
Feed Location https://soylentnews.org/index.rss
Feed Title SoylentNews
Feed Link https://soylentnews.org/
Feed Copyright Copyright 2014, SoylentNews
Reply 0 comments