Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

10:20 AM
Connect Directly

'Next-Gen' Supply Chain Attacks Surge 430%

Attackers are increasingly seeding open source projects with compromised components.

As commercial and enterprise software developers become more disciplined about keeping their open source software components updated to reduce the risk of software supply chain attacks, the bad guys are getting craftier: Researchers warn that they're over-running open source projects to turn them into malware distribution channels.

It used to be that attackers simply preyed on existing vulnerabilities within well-used open source components, with the understanding they could victimize the many organizations relying on outdated dependencies. Attackers are now more frequently getting proactive by infiltrating open source projects to seed them with compromised components that they can pounce on once they're downloaded and used by unsuspecting organizations.

According to the latest "2020 State of the Software Supply Chain" report just released by Sonatype, these so-called "next-generation" supply chain attacks are surging markedly, up 430% in the past year.

"Adversaries are shifting their activities 'upstream,' where they can infect a single open source component that has the potential to be distributed 'downstream,' where it can be strategically and covertly exploited," explains Wayne Jackson, CEO of Sonatype.

As the report explains, attackers are leveraging the very nature of open source software development against itself with these next-gen supply chain attacks. Open source projects rely on contributions from volunteers, and these projects themselves frequently incorporate hundreds or even thousands of dependencies from other projects. The ethos of open source projects is one that relies on shared trust, all of "which creates a fertile environment whereby bad actors can prey upon good people with surprising ease," the report explains. 

In fact, the attackers are now starting to seek out ways to scale up their efforts to plant bad components through automated malware that goes directly after development pipelines. The most recent sophisticated example of a next-gen software supply chain attack was discovered lurking on GitHub in May. Researchers found a piece of malware called Octopus Scanner that targeted GitHub users involved in developing NetBeans projects. The software was designed to serve up backdoored code into NetBeans components on GitHub repositories without the legitimate repository owners even realizing it. This means that every time developers of these components release code to the public, it has already been owned by the attacker.

"In an OSS context, it gives the malware an effective means of transmission since the affected projects will presumably get cloned, forked, and used on potentially many different systems," explained GitHub security researcher Alvaro Muñoz, in a blog about Octopus Scanner. "The actual artifacts of these builds may spread even further in a way that is disconnected from the original build process and harder to track down after the fact."

As the Sonatype report shows, though Octopus Scanner may be one of the more sophisticated next-gen supply chain attacks, it is far from an isolated incident. It followed closely on the heels of an attack found this spring by researchers with ReversingLabs that used a typosquatting approach to carry out their malicious deeds. They seeded the package repository for Ruby Gems with 760 malicious packages that used slight name variations from legitimate packages.

Meantime, at Black Hat USA earlier this month, researchers showed how a next-gen approach could be used to attack Node.js applications by manipulating the hidden properties used to track internal program states.

The rise in these next-generation software supply chain attacks follows a well-worn story in the security world. Anyone who has been in the business long enough recognizes that no good deed goes unpunished; when many security teams start doing a good job stemming off one kind of attack, the bad guys shift to another. As Sonatype points out, this latest trend is partially a reaction to the fact that many enterprises have done a great job in reducing their open source component risk exposure. Organizations utilizing DevSecOps practices are able to update dependencies 530 times faster than the average organization. According to the report's research, 49% of organizations are now able to remediate open source vulnerabilities within a week of detection. 

It's an improving situation, but experts warn that even as the number of next-gen attacks rise, organizations still need to keep improving their stance against legacy attacks. The report's research shows new open source vulnerabilities are exploited in the wild within three days of public exposure, and some 86% of organizations are still open to these exploits within that window. 


Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/30/2020
'Act of War' Clause Could Nix Cyber Insurance Payouts
Robert Lemos, Contributing Writer,  10/29/2020
6 Ways Passwords Fail Basic Security Tests
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/28/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Measure and Reduce Cybersecurity Risk in Your Organization
In this Tech Digest, we examine the difficult practice of measuring cyber-risk that has long been an elusive target for enterprises. Download it today!
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-30
NVIDIA CUDA Toolkit, all versions prior to 11.1.1, contains a vulnerability in the NVJPEG library in which an out-of-bounds read or write operation may lead to code execution, denial of service, or information disclosure.
PUBLISHED: 2020-10-30
baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. The issue affects the following components: Edit feed settings, Edit widget area, Sub site new registration, New category registration. Arbitrary JavaScript may be executed by entering specific characters in the account that can ac...
PUBLISHED: 2020-10-30
baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. Arbitrary JavaScript may be executed by entering a crafted nickname in blog comments. The issue affects the blog comment component. It is fixed in version 4.4.1.
PUBLISHED: 2020-10-30
baserCMS before version 4.4.1 is affected by Remote Code Execution (RCE). Code may be executed by logging in as a system administrator and uploading an executable script file such as a PHP file. The Edit template component is vulnerable. The issue is fixed in version 4.4.1.
PUBLISHED: 2020-10-30
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. ALSO NOTE: CVE-2020-7373 is a duplicate of CVE-2020-17496. CVE-2020-17496 is ...