<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Unicode — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/unicode/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 15 Mar 2026 15:30:24 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/unicode/feed.xml" rel="self" type="application/rss+xml"/><item><title>Glassworm Malware Hidden in Unicode Characters Affecting GitHub Repositories</title><link>https://feed.craftedsignal.io/briefs/2024-02-29-glassworm-unicode-malware/</link><pubDate>Sun, 15 Mar 2026 15:30:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-02-29-glassworm-unicode-malware/</guid><description>The Glassworm malware utilizes invisible unicode characters to infect over 150 GitHub repositories, posing a supply chain risk to developers and users.</description><content:encoded><![CDATA[<p>The Glassworm malware is a newly discovered threat that leverages the presence of invisible Unicode characters within source code to inject malicious payloads into software projects.  Discovered in early 2026, this malware has already compromised over 150 repositories on GitHub. The attack focuses on injecting these invisible characters into popular repositories, particularly those related to JavaScript and Node.js development, potentially impacting a wide range of applications and services. The delivery mechanism involves contributors with malicious intent adding these characters or compromised accounts injecting them. This sophisticated approach allows the malware to remain undetected during code reviews and traditional security scans, making it a significant threat to the software supply chain.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious actor gains commit access to a target GitHub repository through either direct contribution or compromised credentials.</li>
<li>The actor injects invisible Unicode characters into source code files, such as JavaScript or package.json files.</li>
<li>These Unicode characters are strategically placed within the code to be innocuous visually but alter the program&rsquo;s execution when interpreted.</li>
<li>The altered code, containing the Unicode characters, is committed to the repository, potentially passing initial code review checks due to the characters&rsquo; invisibility.</li>
<li>When a developer clones or downloads the compromised repository, the Unicode characters are included in their local copy of the code.</li>
<li>During the build process (e.g., <code>npm install</code>), the malicious code embedded within the Unicode characters is executed.</li>
<li>This execution leads to the download and execution of a secondary payload from a remote server, potentially installing malware, backdoors, or exfiltrating sensitive data.</li>
<li>The final objective is to compromise the developer&rsquo;s system or to inject malicious code into applications built using the compromised repository, thus propagating the malware further.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful deployment of Glassworm can lead to widespread supply chain compromise, potentially affecting thousands of developers and end-users.  Over 150 GitHub repositories have already been identified as infected, and the actual number could be much higher. Successful exploitation leads to arbitrary code execution on developer machines and within deployed applications. The compromised code can steal credentials, inject backdoors, and exfiltrate sensitive data, leading to significant financial and reputational damage. The lack of visibility makes remediation challenging.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement static analysis tools capable of detecting invisible Unicode characters in source code repositories (reference: Overview).</li>
<li>Deploy the Sigma rules provided below to identify suspicious process executions originating from build processes that may indicate Glassworm activity.</li>
<li>Educate developers about the risks associated with invisible Unicode characters and the importance of careful code review (reference: Attack Chain).</li>
<li>Implement multi-factor authentication on all developer accounts to prevent account compromise (reference: Attack Chain).</li>
<li>Monitor network traffic for connections to suspicious or unknown domains originating from build processes (reference: Attack Chain).</li>
<li>Utilize file integrity monitoring (FIM) to track changes to critical files within repositories and development environments (reference: Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>unicode</category><category>malware</category><category>github</category></item><item><title>Command Obfuscation via Unicode Modifier Letters</title><link>https://feed.craftedsignal.io/briefs/2024-01-unicode-cmd-obfuscation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unicode-cmd-obfuscation/</guid><description>Adversaries use Unicode modifier letters to obfuscate command-line arguments, evading string-based detections on common Windows utilities like PowerShell and cmd.exe.</description><content:encoded><![CDATA[<p>Attackers are increasingly employing Unicode modifier letters to obfuscate command-line arguments, thereby bypassing traditional string-based detection mechanisms. This technique involves replacing standard ASCII characters with visually similar Unicode characters, making it difficult for simple pattern-matching rules to identify malicious commands. The obfuscation targets common Windows utilities such as <code>reg.exe</code>, <code>net.exe</code>, <code>certutil.exe</code>, <code>PowerShell.exe</code>, <code>cmd.exe</code>, and others frequently abused in post-exploitation scenarios. Defenders need to implement more sophisticated detection methods that account for Unicode normalization or character range analysis to identify and mitigate this threat. This technique has become more prevalent in the last year as attackers seek to evade common detection strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>Execution: The attacker executes a command-line utility like <code>cmd.exe</code> or <code>powershell.exe</code> to perform malicious actions.</li>
<li>Obfuscation: The command-line arguments are obfuscated by replacing ASCII characters with Unicode modifier letters.</li>
<li>Defense Evasion: The obfuscation allows the attacker to evade simple string-based detections that would normally flag the command as malicious.</li>
<li>Privilege Escalation: The attacker may use the obfuscated command to escalate privileges or gain access to sensitive resources.</li>
<li>Persistence: The attacker may establish persistence by creating a scheduled task or modifying the registry using obfuscated commands.</li>
<li>Lateral Movement: The attacker may use the obfuscated command to move laterally to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful command obfuscation can lead to a significant compromise of Windows systems. Attackers can bypass security controls and execute malicious code undetected, potentially leading to data theft, system disruption, or ransomware deployment. The obfuscation makes it harder for security teams to identify and respond to attacks, increasing the dwell time and potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to detect the presence of Unicode modifier letters in command lines (references: Sigma rules).</li>
<li>Enable Sysmon process creation logging to capture command-line arguments for analysis (references: Sysmon setup instructions).</li>
<li>Investigate any alerts triggered by the Sigma rule and analyze the raw command lines to identify the true intent of the command (references: Triage and Analysis section of the source).</li>
<li>Consider implementing Unicode normalization techniques to remove the obfuscation before analyzing command lines.</li>
<li>Monitor the listed processes (<code>reg.exe</code>, <code>net.exe</code>, <code>certutil.exe</code>, etc.) more closely for suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>command-line</category><category>unicode</category><category>obfuscation</category></item></channel></rss>