Researchers say more than 454,000 malicious open source packages were found in 2025

March 22, 20262 min read2 sources
Share:
Researchers say more than 454,000 malicious open source packages were found in 2025

Sonatype says it has identified more than 454,000 malicious open source packages so far in 2025, a surge the company describes as evidence that open source malware has become industrialized rather than opportunistic. The packages were found across major ecosystems used by developers and enterprises, including npm, PyPI, Maven Central, and NuGet.

According to Sonatype, attackers are increasingly using automation to publish lookalike packages, poison dependency chains, and push malicious updates at scale. Common tactics include typosquatting, dependency confusion, and abuse of install-time scripts to steal credentials, exfiltrate secrets, or fetch second-stage malware. The report does not point to a single CVE; instead, it tracks a broad supply-chain threat trend across public package registries.

The scale matters because these repositories sit directly in software build pipelines. A malicious package can reach developer workstations, CI/CD systems, and production applications through routine dependency installs. If tokens or cloud credentials are exposed, the damage can extend well beyond a single machine to source code theft, account takeover, and downstream compromise of customers.

Sonatype argues that public registries should now be treated as hostile-by-default sources, with organizations enforcing tighter controls over what dependencies can be pulled into builds. Recommended defenses include allowlisting approved packages, pinning versions, using private mirrors or proxy registries, scanning dependencies for malware, and limiting automatic script execution during installs. For remote developers working across public networks, basic protections such as a VPN may help reduce exposure, but they do not address the core software supply-chain risk.

The findings add to a multi-year rise in open source package abuse, but the 2025 figure suggests attackers are now operating with assembly-line efficiency. For defenders, the message is straightforward: package trust can no longer be assumed, even when software comes from widely used public registries.

Share:

// SOURCES

// RELATED

Enterprise cybersecurity software fails 20% of the time, warns Absolute Security

A new report finds 20% of enterprise security tools are failing due to poor patch management and IT complexity, leaving organizations dangerously expo

6 min readApr 1

The FCC's router ban: A necessary security measure or the wrong fix?

The FCC put foreign-made consumer routers on its prohibited list to protect national security, but critics argue the ban creates a false sense of secu

6 min readApr 1

Trivy hack spreads infostealer via Docker, triggers worm and Kubernetes wiper

A hypothetical supply chain attack on the Trivy security scanner via Docker Hub highlights a severe threat involving an infostealer, worm, and a Kuber

6 min readApr 1

We found eight attack vectors inside AWS Bedrock. Here's what attackers can do with them

Security researchers have uncovered eight critical attack vectors in AWS Bedrock, Amazon's AI platform, revealing how its deep enterprise integration

7 min readApr 1