HomeMalware & ThreatsNew Report Reveals U.S. Dominance in Anonymous Open-Source Contributions

New Report Reveals U.S. Dominance in Anonymous Open-Source Contributions

Published on

spot_img

A recent report by Lineaje AI Labs has illuminated a concerning trend in the world of open-source software development. The United States, while being the top contributor to open-source projects, also leads in anonymous contributions. This revelation has sparked significant apprehensions regarding transparency and security within the global software supply chain.

Entitled “Crossing Boundaries: Breaking Trust,” the report underscores the geopolitical risks intertwined with the geographical distribution of open-source contributions. As nation-state cyberattacks continue to escalate, the provenance of code has emerged as a crucial issue impacting national and economic security. Microsoft has estimated that its customers are bombarded with a staggering 600 million cyberattacks daily, with 24% of these targeting the IT sector emanating from nation-state attackers.

Key findings from the report indicate that the U.S. accounts for over one-third (34%) of global open-source contributions, with Russia following closely at 13%. Other noteworthy contributors include Canada, the United Kingdom, and China. However, what raises eyebrows is the high rate of anonymous open-source contributions originating from the U.S., amounting to 20% – more than double the rate of Russian contributions and triple that of Chinese contributions. Globally, approximately 5-8% of open-source components are shrouded in obscurity, with their origins unknown or dubious, thereby potentially introducing hidden backdoors, malware, or critical vulnerabilities into software systems.

Moreover, industries dependent on critical software components such as defense, water, electricity, banking, and retail face challenges in software maintenance due to contributions from multiple countries. This convoluted scenario renders it arduous to entirely exclude adversarial nations from the software supply chain.

The report also outlines troubling trends in the maintenance of open-source software, exacerbating critical vulnerabilities. Open source code contributes 2 to 9 times the code developers write, with over 95% of security weaknesses emanating from open-source dependencies. Alarmingly, more than half (51%) of these vulnerabilities have no known fixes, and a staggering 70% of open-source components are inadequately maintained. Surprisingly, unmaintained open-source software is found to be less vulnerable compared to well-maintained counterparts, the latter being 1.8 times more vulnerable due to the high rate of changes.

Furthermore, open-source projects can embed up to 60 layers of components, thereby complicating risk assessment and remediation efforts. Understanding which vulnerabilities to address can significantly streamline efforts, potentially reducing the workload by at least 50% and enhancing overall security posture by 20-70%. Additionally, the presence of multiple versions of open-source components within a single application adds complexity to remediation endeavors, with over 15% of such components exhibiting this version sprawl issue.

As the utilization of open-source software continues to surge, particularly within the global software supply chain, the need to comprehend and mitigate risks associated with anonymous contributions and maintenance gaps is paramount, particularly against the backdrop of escalating geopolitical tensions. The security and integrity of software systems hinge on addressing these pressing challenges to ensure a resilient and secure digital landscape.

Source link

Latest articles

SERAP files lawsuit against Tinubu government and governors at ECOWAS court for alleged misuse of Cybercrimes Act

A civil society organization, the Socio-Economic Rights and Accountability Project (SERAP), has taken legal...

United Nations Aviation Agency Data Breach Reveals Recruitment Information

The International Civil Aviation Organization (ICAO), a United Nations agency responsible for coordinating global...

Advancements in Machine Identity Protections – Source: securityboulevard.com

In the realm of cybersecurity, the protection of Non-Human Identities (NHIs) has emerged as...

Webinar: 10 Strategies to Tackle Alert Fatigue with Smarter SOC

Lauren Brennan is a seasoned cybersecurity expert with a specialization in SOC optimization, threat...

More like this

SERAP files lawsuit against Tinubu government and governors at ECOWAS court for alleged misuse of Cybercrimes Act

A civil society organization, the Socio-Economic Rights and Accountability Project (SERAP), has taken legal...

United Nations Aviation Agency Data Breach Reveals Recruitment Information

The International Civil Aviation Organization (ICAO), a United Nations agency responsible for coordinating global...

Advancements in Machine Identity Protections – Source: securityboulevard.com

In the realm of cybersecurity, the protection of Non-Human Identities (NHIs) has emerged as...