Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Open Source Is Free But at The Expense of Security
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Open Source Is Free But at The Expense of Security
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

News » Open Source Is Free But at The Expense of Security

News

Open Source Is Free But at The Expense of Security

Open source software is being flooded with malware, but developers are still ignoring critical updates.

Marco Rizal
Last updated: October 24, 2024 11:54 am
By Marco Rizal - Editor, Journalist 4 Min Read
Share
Open Source Is Free But at The Expense of Security
SHARE
  • Over 512,000 malicious packages infiltrated open source ecosystems in 2023.
  • 80% of vulnerable applications remain unpatched for more than a year.
  • Only 61,000 out of 7 million new open source components had security-focused SBOM.

Malware is rapidly spreading throughout the open source ecosystem, putting the entire software supply chain at risk.

According to Sonatype, over 512,000 new malicious packages have been detected in popular repositories such as Java, JavaScript, Python, and .NET since November 2023.

This alarming surge represents a 156% increase in malicious components, indicating that open source software is rapidly becoming a preferred playground for attackers.

According to Sonatype's State of the Software Supply Chain report, “A rise in open source malware has infiltrated open source ecosystems at an alarming rate.”

The company emphasizes that these attacks primarily target developers and avoid traditional security measures.

This has resulted in a wave of supply chain attacks, leaving applications vulnerable despite existing security measures.

The ease with which hackers can conceal malware in seemingly innocent packages has made it difficult for developers and automated build environments to detect threats early on.

The increase in malicious components complicates the already chaotic world of open source development.

According to Sonatype's data, more than 80% of applications with vulnerable third-party components have gone unpatched for more than 12 months.

In 95% of cases, safer alternatives are available, but developers still fail to implement them.

Failure to patch or update vulnerable software continues to expose organizations to unnecessary risks.

The rapid pace of development is one of the primary causes of the slow response.

According to Sonatype's report, “the impossibility of slowing down DevOps processes to perform manual vulnerability reviews,” is a key factor in the persistence of vulnerable components.

Even well-known issues, such as the infamous Log4j vulnerability, can remain in development pipelines for years.

Nearly three years after the discovery of Log4Shell, 13% of Log4j downloads remain for vulnerable versions.

Each ecosystem poses unique challenges. NPM, for example, experienced a flood of malicious packages as a result of spam, while Python's rapid growth has resulted in a higher number of vulnerabilities per package.

Despite its massive user base, Java continues to struggle with outdated versions, complicating efforts to secure applications.

These vulnerabilities have severe consequences. Nearly 14% of the malware components detected are intended to steal sensitive data, such as environment variables and authentication tokens.

Sonatype also noted the prevalence of phishing attacks, in which hackers use dependency confusion to trick developers into downloading malicious packages masquerading as legitimate ones.

Some packages even include backdoors that allow attackers to remotely control compromised systems.

Organizations that want to fight back against these attacks face an uphill battle.

The increasing number of open source components, combined with longer timelines for fixing vulnerabilities, makes it difficult to remain secure.

In many cases, high-severity vulnerabilities now take more than 500 days to resolve, with even low-severity flaws remaining open for 700 days or longer.

Sonatype suggests that using Software Bills of Materials (SBOM) to track dependencies can help mitigate these risks.

Projects using SBOMs resolved issues 264 days faster than those without, but adoption of these tools is slow.

Only 61,000 of the nearly 7 million open source components released in the last year included SBOMs.

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Diddy malware

Deleted Diddy Tweets Are Being Used as Bait to Spread Malware

Untitled design 31

Dogecoin’s Bright Future: Crypto Donations, ETP Launch, and the Race to $1

YouTube Milking Videos Used as a Gateway to Adult Fan Sites

YouTube ‘Milking’ Videos Used as a Gateway to Adult Fan Sites

When The House Loses Gambling Industry Caught Off Guard By Hackers

When The House Loses; Gambling Industry Caught Off Guard By Hackers

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?