Invisible Malware Infiltrates GitHub and Other Repositories

Supply-chain attack floods repositories with malicious packages containing invisible code, evading traditional defenses
Researchers have discovered a new supply-chain attack that is flooding repositories with malicious packages containing invisible code, a technique that is evading traditional security defenses.
The researchers, from the firm Aikido Security, reported finding 151 malicious packages that were uploaded to GitHub from March 3 to March 9. Supply-chain attacks have been a common threat for nearly a decade, where attackers upload malicious packages with code and names resembling widely used libraries, tricking developers into incorporating them into their software.
The latest attack has adopted a new technique: the use of selective code that is invisible when loaded into virtually all editors, terminals, and code review interfaces. While most of the code appears normal and readable, the malicious functions and payloads – the usual telltale signs of malware – are rendered invisible to traditional defenses.
Aikido Security researchers explain that the attackers are leveraging Unicode characters to obfuscate the malicious portions of the code, making them appear as benign comments or whitespace to most tools and systems. However, when the package is executed, the invisible code is activated, allowing the attackers to gain control of the affected systems.
This new technique poses a significant challenge for security researchers and developers, as traditional malware detection methods are not effective against these invisible threats. The researchers warn that this attack vector could be widely exploited in the future, as attackers continue to find new ways to bypass security measures.
To mitigate the risk of such supply-chain attacks, experts recommend that developers and organizations implement robust code review processes, use automated security scanning tools, and stay vigilant for any suspicious package uploads to the repositories they rely on.
The discovery of this invisible malware highlights the evolving sophistication of cybercriminals and the need for continual innovation in security solutions to keep pace with the changing threat landscape.
Source: Ars Technica


