430% increase in next generation open source cyber attacks

Study also finds 51% of organizations require more than a week to remediate new zero-day vulnerabilities.

  • 4 years ago Posted in
Sonatype has released its sixth annual State of the Software Supply Chain Report. This year’s report found a massive 430% surge in next generation cyber-attacks aimed at actively infiltrating open source software supply chains. 

 

Rise of Next-Gen Software Supply Chain Attacks

 

According to the report, 929 next generation software supply chain attacks were recorded from July 2019 through May 2020. By comparison 216 such attacks were recorded in the four years between February 2015 and June 2019.

 

The difference between “next generation” and “legacy” software supply chain attacks is simple but important: next generation attacks like Octopus Scanner and electron-native-notify are strategic and involve bad actors intentionally targeting and surreptitiously compromising “upstream” open source projects so they can subsequently exploit vulnerabilities when they inevitably flow “downstream” into the wild.  Conversely, legacy software supply chain attacks like Equifax are tactical and involve bad actors waiting for new zero day vulnerabilities to be publicly disclosed and then racing to take advantage in the wild before others can remediate.

 

“Following the notorious Equifax breach of 2017, enterprises significantly ramped investments to prevent similar attacks on open source software supply chains,” said Wayne Jackson CEO at Sonatype. “Our research shows that commercial engineering teams are getting faster in their ability to respond to new zero-day vulnerabilities. Therefore, it should come as no surprise that next generation supply chain attacks have increased 430% as adversaries are shifting their activities ‘upstream’ where they can infect a single open source component that has the potential to be distributed ‘downstream” where it can be strategically and covertly exploited.”

 

Speed Remains Critical When Responding to Legacy Software Supply Chain Attacks

 

According to the report, enterprise software development teams differ in their response times to vulnerabilities in open source software components:

 

  • 47% of organizations became aware of new open source vulnerabilities after a week; and
  • 51% of organizations took more than a week to remediate the open source vulnerabilities

For the second year in a row, Sonatype also partnered with researchers Gene Kim from IT Revolution and Dr. Stephen Magill, CEO at MuseDev to examine how high performing teams successfully demonstrate superior risk management outcomes while maintaining high levels of productivity. The researchers discovered that not all organizations prioritize improved risk management practices at the expense of developer productivity. This year’s report reveals that high performing development teams are 26x faster at detecting and remediating open source vulnerabilities, and deploy changes to code 15x more frequently than their peers. High performers are also:

 

  • 59% more likely to be using automated software composition analysis (SCA) to detect and remediate known vulnerable OSS components across the SDLC
  • 51% more likely to centrally maintain a software bill of materials (SBOMs) for applications
  • 4.9x more likely to successfully update dependencies and fix vulnerabilities without breakage
  • 33x more likely to be confident that OSS dependencies are secure (i.e., no known vulnerabilities)

 

Additional findings from the report include:

 

  • 1.5 trillion component download requests projected in 2020 across all major open source ecosystems (see page 13)
  • 10% of java OSS component downloads by developers had known security vulnerabilities (see page 32)
  • 11% of open source components developers build into their applications are known vulnerable, with 38 vulnerabilities discovered on average (see page 34)
  • 40% of npm packages contain dependencies with known vulnerabilities (see page 32)
  • New open source zero-day vulnerabilities are exploited in the wild within 3 days of public disclosure (see page 11)
  • The average enterprise sources code from 3,500 OSS projects including over 11,000 component releases (see page 33)

“We found that high performers are able to simultaneously achieve security and productivity objectives,” said Gene Kim, DevOps researcher and author of the WSJ bestselling book, The Unicorn Project.  “It’s fantastic to gain a better understanding of the principles and practices of how this is achieved, as well as their measurable outcomes.”

 

“It was really exciting to find so much evidence that this much-discussed tradeoff between security and productivity is really a false dichotomy. With the right culture, workflow, and tools development teams can achieve great security and compliance outcomes together with class-leading productivity,” said Dr. Stephen Magill, Principal Scientist at Galois & CEO of MuseDev.

Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Aqua’s cloud native application protection platform becomes the only solution that protects cloud...
54% of organisations working on a security transformation project now or in the next 12 months.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...