Aikido Security recently uncovered a sophisticated malware campaign named Glassworm, which uses invisible Unicode characters to hide malicious code.

Over 150 GitHub repositories, npm packages, and Visual Studio Code extensions were affected. To make detection even harder, the malware uses the Solana blockchain as its command-and-control infrastructure. Its main target? Cryptocurrency wallet credentials.

Invisible Characters Concealing Malicious Code

Glassworm uses a clever but dangerous technique. Attackers employ Unicode characters from the Private Use Area (PUA) that do not display on screen, yet contain actionable values.

In practice:

  • Each invisible character represents a code point.
  • The malware decodes these points to reconstruct a payload, executed via eval().
  • Result: the malicious code is present right in front of you, but invisible.

The campaign occurred between March 3–9, 2026. Over 150 GitHub repositories were compromised, along with npm packages like @aifabrix/miso-client and @iflow-mcp/watercrawl-watercrawl-mcp.

For VS Code, the quartz-markdown-editor extension and 72 extensions on Open VSX were affected. Attackers also leveraged LLMs (language models) to generate plausible commit messages, making the malware nearly undetectable to reviewers.

Solana: A Nearly Indestructible Infrastructure

Glassworm’s infrastructure is what makes it especially dangerous.

  • Instead of a standard central server, the malware fetches commands from the Solana blockchain.
  • These instructions are publicly accessible and nearly impossible to remove.

The ultimate goal? Stealing crypto wallet data. Glassworm targets 49 browser extensions, including MetaMask, Coinbase Wallet, and Phantom, and exfiltrates stored credentials to attacker servers.

A Threat to Open Source Trust

Glassworm exposes a concerning blind spot in open source security:

  • Users often install packages or extensions without reviewing the code.
  • With code hidden in invisible Unicode characters, detection becomes extremely difficult.

Hiding code in invisible characters, using blockchain for commands, and leveraging AI to camouflage commits represents a rarely seen level of sophistication in the open-source ecosystem.

Conclusion

Glassworm highlights the next generation of malware: stealthy, resilient, and hard to detect.

Developers and users in the open-source community should:

  • Carefully vet packages and extensions before installing.
  • Follow security alerts from firms like Aikido Security.
  • Recognize that even invisible code can pose serious threats.

Protecting crypto wallets and the wider open-source ecosystem now requires heightened vigilance and advanced detection tools to combat such sophisticated attacks.

Did you enjoy this article? Feel free to share it on social media and subscribe to our newsletter so you never miss a post!

And if you'd like to go a step further in supporting us, you can treat us to a virtual coffee ☕️. Thank you for your support ❤️!
Buy Me a Coffee

Categorized in: