THE AMERICA ONE NEWS
Aug 5, 2025  |  
0
 | Remer,MN
Sponsor:  QWIKET 
Sponsor:  QWIKET 
Sponsor:  QWIKET: Elevate your fantasy game! Interactive Sports Knowledge.
Sponsor:  QWIKET: Elevate your fantasy game! Interactive Sports Knowledge and Reasoning Support for Fantasy Sports and Betting Enthusiasts.
back  
topic
Vaughn Cockayne


NextImg:Russian, Chinese coders secretly insert malicious code in open-source software, says new report

As businesses and government services continue to adopt open-source software, a new report indicates that foreign actors are secretly infiltrating software infrastructure with ill intent.

According to a report from strategic intelligence company Strider, the widespread adoption of OSS has outpaced the development of relevant cybersecurity measures, allowing well-trained “advanced persistent threat groups” to insert malicious code into widely used software.

OSS is source code that is publicly available and licensed for use by any party.



The code is often available for free and is open to modification by anyone. The report argues that this philosophy has let state-affiliated actors from Russia, China and North Korea distribute malicious code.

“The realities of our geopolitical situation require new approaches to protect that open environment,” the Strider report reads. “State-sponsored cyber threat groups, like APT41 (PRC), Lazarus Group (North Korea), and Cozy Bear (Russia), have exploited open source platforms such as GitHub to further their governments’ strategic objectives.”

Some studies indicate that more than 90% of modern applications contain open-source code, and a large portion of commercial code bases incorporate some OSS.

Due to the widespread use of OSS in enterprise applications, a single line of malicious code inserted by staff-affiliated actors can have a cascading effect across various industries, the report noted.

Such infiltrations can lead to “operational disruptions, data breaches, unauthorized access to sensitive information, and reputational damage,” it said.

Advertisement

According to Strider, adding malicious code to popular OSS is not a quick and easy scam for advanced persistent threat groups. Sometimes, actors will spend years building respectable reputations before adding their own harmful code.

“There’s inherent risk when someone is playing the long game,” Strider Director of Global Communications Paige Waltz said.

“In some of these incidents that we’ve seen, people are taking years to gain trust and contributing sometimes 40, 50 times to a code before they start injecting a malicious backdoor that you don’t catch because it’s not being moderated or they’ve reached a status of a maintainer so that they can approve their own code,” she explained.

As an example, Strider’s report cites the Log4Shell vulnerability exploitation incident from 2021, where hackers leveraged the vulnerability of OSS to execute arbitrary code. The incident led to massive data breaches and compromised systems across various sectors.

Cybersecurity firms and government intelligence agencies found that actors associated with China, North Korea, Iran and Turkey were involved in the breach.

Advertisement

Strider reported that the Log4Shell breach cost affected organizations upwards of $90,000 in incident response per incident, with the total cost for the industry reaching in the billions.

In 2023, nearly two years after the incident, 72% of affected organizations were still reporting active exploitation events.

The Strider report suggests that businesses and government entities use a “contributor-focused approach” when structuring security measures. By focusing on who is contributing to the code used, organizations are able to make informed decisions about the software they adopt.

“Just as you would want to know whether a North Korean IT worker is applying for a job at your company, you should want to know whether someone who has a history of working with the PLA or Russian intelligence is already in your company by contributing the code that your company is using in their everyday workflows or in some of the technology and products that you’re developing,” Ms. Waltz said.

Advertisement

• Vaughn Cockayne can be reached at vcockayne@washingtontimes.com.