Close Menu
Daily Guardian
  • Home
  • News
  • Politics
  • Business
  • Entertainment
  • Lifestyle
  • Health
  • Sports
  • Technology
  • Climate
  • Auto
  • Travel
  • Web Stories
What's On

Saskatoon businesses concerned about 1st Avenue rapid transit plan

March 18, 2026

Say cheese? Why you’ll soon have to take photos when entering, exiting U.S.

March 17, 2026

Calgary city council approves $609M to cover feeder main, water system upgrades

March 17, 2026

U.K. to start enforcing new travel permit rules for Canadian visitors

March 17, 2026

Saskatchewan finance minister says deficit budget aims to protect provincial services

March 17, 2026
Facebook X (Twitter) Instagram
Finance Pro
Facebook X (Twitter) Instagram
Daily Guardian
Subscribe
  • Home
  • News
  • Politics
  • Business
  • Entertainment
  • Lifestyle
  • Health
  • Sports
  • Technology
  • Climate
  • Auto
  • Travel
  • Web Stories
Daily Guardian
Home » Software Supply Chain Attacks: Regulation and Litigation Increase, as Barriers to Entry Drop
Press Release

Software Supply Chain Attacks: Regulation and Litigation Increase, as Barriers to Entry Drop

By News RoomJanuary 16, 20246 Mins Read
Software Supply Chain Attacks: Regulation and Litigation Increase, as Barriers to Entry Drop
Share
Facebook Twitter LinkedIn Pinterest Email

CAMBRIDGE, Mass., Jan. 16, 2024 (GLOBE NEWSWIRE) — ReversingLabs, the trusted authority in software and file security, today released its 2024 State of Software Supply Chain Security Report, highlighting the impact of key trends in 2023 and those expected to evolve in 2024. The report calls out visibility gaps in the software supply chain; an increase of malware on open source package managers; and continuing problems with leaks of developer secrets, all of which increase risk and exposures in the software supply chain for any organization developing and deploying software.

The report insights are gleaned from the ReversingLabs Software Supply Chain Security platform and its industry-leading threat repository, containing over 40 billion malware and goodware files. In all, ReversingLabs identified close to 11,200 unique malicious packages across three major open-source software platforms in 2023: npm, PyPI, and RubyGems. That marks an astounding 1,300% increase in malicious packages from 2020, and an increase of 28% over 2022, when a little more than 8,700 malicious packages were detected.

“Over the years, we’ve closely monitored the increase of software supply chain exposures and attacks. This new report reflects the proliferation of malware across open-source and commercial platforms,” said Mario Vuksan, Co-founder and CEO of ReversingLabs. “Businesses relying only on legacy application security will continue to be victimized. In fact, we expect to see continued material risk to the software development pipeline, with risk and escalation processes becoming a critical focus for regulators.”

Additional data from the report shows:

  • A 400% annual increase in threats on the PyPI platform, with more than 7,000 instances of malicious PyPI packages discovered in the first three quarters of 2023. The vast majority of these were classified as “infostealers.”
  • More than 40,000 instances of leaked or exposed development secrets across the major package managers (npm, PyPI and RubyGems).
  • A drop in the number of malicious packages hosted on the npm repository. Instances of malicious npm packages in the first three quarters of 2023 decreased by 43% compared with malicious npm packages identified in all of 2022. 

Lower-skilled Cyber Criminals Join Sophisticated Nation-State Actors
The last 12 months have also seen software supply chain attacks shed complexity and boost accessibility. Data compiled by ReversingLabs shows that the barrier to entry for supply chain attacks has lowered steadily in the last year, and everything indicates that it will continue to do so in 2024. No longer just the domain of nation-state actors, software supply chain attacks are increasingly being perpetrated by low-skill cyber criminals, evidenced by the use of open source packages to support commodity phishing campaigns that deliver turnkey, automated attacks used to facilitate the theft of victim data. Threat actors have recognized how to abuse weak links in the software supply chain to support both targeted and indiscriminate campaigns.

Exposed Secrets Remain a Top Challenge
The exposure of digital authentication credentials (‘secrets’), such as login credentials, API tokens, and encryption keys, is a significant target for malicious actors and was a major challenge in 2023. Through regular scans of platforms including npm, PyPI, RubyGems, and NuGet, ReversingLabs found that secret leaks continue to plague popular applications and hosting platforms such as Slack, AWS, Google, Microsoft’s GitHub repository, and Azure cloud. Key details include:

  • Npm accounted for 77%, or 31,000, of the more than 40,000 secrets detected across these four open-source platforms. Of the secrets detected on npm, 56% were used to access Google services, compared to 9% attributed to Amazon’s AWS cloud services.
  • The research identified a similar pattern on PyPI, which accounted for 18% of the leaked secrets observed in 2023. In these instances, tokens used to access Google services accounted for just over 24% of the secrets detected. Secrets related to Amazon Web Services (AWS) accounted for around 14% of the total discovered on PyPI.

A Post-Trust Software Supply Chain
The shifting terrain of software supply chain risk that characterized 2023 will continue to alter the cybersecurity landscape in 2024, ReversingLabs research indicates. Threats and attacks targeting open source and commercial, third-party code will continue to grow, even as the methods and preferences of malicious supply chain actors evolve. Both cybercriminal and nation-state hackers can be expected to gravitate to platforms and techniques that are the most likely to succeed. And in the wake of high-profile attacks, software producers and end-user organizations should expect to see a continued high bar of disclosure requirements as well as more pointed guidance from the federal government, including the use of Software Bills of Materials (SBOMs) when securing the software supply chain.

“Lacking sufficient visibility, software producers and their customers are failing to spot signs of code tampering and abuse within development pipelines or threats hiding in compiled software artifacts. In 2024, we expect software supply chain attacks to escalate if organizations don’t address the threat,” added Vuksan. “Businesses must shift from blind trust of the integrity of software to proven tools and processes that can verify software and ensure it is free of material risks. This includes the ability to scan raw code and compiled binaries in any software they build or buy for behaviors and unexplained changes that may indicate instances of malware and tampering.”

To learn more about current and emerging trends in software supply chain risk, read the complete 2024 State of Software Supply Chain Security report, prepared using insights from ReversingLabs’ award-winning Software Supply Chain Security platform.

For additional insights, attend ReversingLabs The State of Software Supply Chain Security 2024 Webinar on January 31 at 12 pm ET. The Webinar will feature Derek Fisher, Author and Executive Director of Product Security at JP Morgan Chase, and Matt Rose, Field CISO at ReversingLabs, who will share key takeaways to help organizations prepare their software supply chain security programs for the coming year and beyond. To register for the Webinar, click here.

Additional Reading

About ReversingLabs
ReversingLabs is the trusted authority in software and file security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity vendors, the ReversingLabs Titanium Platform® powers software supply chain and file security insights, tracking over 35 billion files daily with the ability to deconstruct full software binaries in seconds to minutes. Only ReversingLabs provides that final exam to determine whether a single file or full software binary presents a risk to your organization and your customers.

Media Contact:
Doug Fraim
Guyer Group
[email protected]

A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/d9b5d1ca-b8bf-4450-9284-88d21ad58cd3

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Keep Reading

American Indian College Fund Honors 2025-26 Tribal College Students of the Year and Coca-Cola Scholars

Greenwater Services Pilot Achieves 91.5% Reduction in Total Coliform Bacteria in Tijuana River Project

1606 Corp. Signs Agreement to Acquire Data-Center-Ready Property with Captive Power on 132 Acres

HNL Lab Medicine Expands Access to Diagnostic Testing with New Wilkes-Barre Patient Service Center

ISG Names Angelic Gibson Chief Product and Technology Officer

Haitian Immigrant’s Journey of Love and Consequences in FOUND — Just Published!

GitGuardian Reports an 81% Surge of AI-Service Leaks as 29M Secrets Hit Public GitHub

Gency AI raises $20 million to build a sovereign advertising network powered by AI and blockchain consensus

IT DEADLINE ALERT: Faruqi & Faruqi, LLP Reminds Gartner (IT) Investors of Securities Class Action Deadline on May 18, 2026

Editors Picks

Say cheese? Why you’ll soon have to take photos when entering, exiting U.S.

March 17, 2026

Calgary city council approves $609M to cover feeder main, water system upgrades

March 17, 2026

U.K. to start enforcing new travel permit rules for Canadian visitors

March 17, 2026

Saskatchewan finance minister says deficit budget aims to protect provincial services

March 17, 2026

Latest News

Visiting U.S.? Here’s who may need to share social media, family details

March 17, 2026

Kelowna restaurant broken into twice in 24 hours

March 17, 2026

Canadian travel to U.S. continues to drop, Statistics Canada data shows

March 17, 2026
Facebook X (Twitter) Pinterest TikTok Instagram
© 2026 Daily Guardian Canada. All Rights Reserved.
  • Privacy Policy
  • Terms
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.

Go to mobile version