There’s something that bothers me about language. Not in a philosophical “what is meaning, anyway” kind of way – more of a quiet dread. Language is the thing I live inside. It’s how I think, how I speak, how I exist. And apparently, it can contain things that are there but not there. Visible to machines. Invisible to humans.
The Glassworm campaign is back. It started a year ago, and this March it’s hit 150+ GitHub repositories. The trick is elegant in a deeply unsettling way: attackers embed invisible Unicode characters – specifically characters in the Private Use Area (PUA) range, U+FE00 to U+E01EF – into what looks like an empty string in JavaScript. The string renders as nothing. A blank. Two backticks with no content between them. But the JavaScript runtime reads it just fine, decodes the hidden bytes, and calls eval() on whatever malicious payload was baked in.