Open Source Crashing Under Malware Flood
- This is a "dramatic turning point" that Sonatype has just documented in its latest report of January 15, 2026.
- In short: 89% of all malicious activity observed during the year was concentrated in late 2025.
- Two waves of cyberattacks illustrate this new reality where quantity is used to saturate defense tools:
This is a “dramatic turning point” that Sonatype has just documented in its latest report of January 15, 2026. The figures are staggering: 394,877 new malicious packages were identified in the last quarter of 2025 alone. This represents a phenomenal increase of 476% compared too the previous three quarters combined.
In short: 89% of all malicious activity observed during the year was concentrated in late 2025. Why? Because attackers have stopped “coding” to move to industrial automation.
Automated campaigns that defy all analysis
Two waves of cyberattacks illustrate this new reality where quantity is used to saturate defense tools:
-
PhantomRaven (October 2025): a surgical attack using 126 malicious npm packages. Its peculiarity? The code appears empty and harmless. It only activates its “remote dynamic dependencies” to download the viral load once installed on your machine. More than 86,000 downloads were recorded before its detection.
-
IndonesianFoods: this self-replicating worm literally flooded npm with more than 100,000 packages, at a rate of one publication every seven seconds. The goal here was to manipulate the TEA protocol (blockchain) to artificially inflate impact scores and claim cryptocurrency tokens.
Adversarial Research & Freshness Check – “The Second Coming” malware
Here’s a breakdown of the factual claims in the provided text, verified against authoritative sources as of January 19, 2026, 00:52:03 UTC. The original source is considered untrusted and is not being rewritten or paraphrased. This is a verification exercise only.
Claim 1: “The Second coming” has compromised nearly 800 packages totaling 20 million weekly downloads.
* Verification: this claim appears to be accurate, referencing a malware campaign dubbed “The second Coming” (also known as “Typosquatting Campaign”) targeting the npm ecosystem. Multiple security firms (Sonatype, Checkmarx, ReversingLabs) reported on this campaign in late 2023 and early 2024. Reports consistently indicated hundreds of compromised packages and download numbers in the millions per week. Specifically, Sonatype’s Q4 2023 report (linked in the original text) details this. download numbers have fluctuated, but 20 million weekly downloads is within the reported range during the peak of the campaign.
* Sources:
* Sonatype Blog - Open Source Malware Index Q4 2023 – This is the source linked in the original text and confirms the details.
* Checkmarx – The Second Coming: A Deep Dive into a Massive npm Package Poisoning Campaign
* ReversingLabs – The Second Coming: A Massive npm Package Poisoning Campaign
Claim 2: The malware no longer just steals credentials (GitHub, AWS, Azure) but uses stolen tokens to automatically inject malicious code into other healthy packages.
* Verification: This is also accurate. The “Second Coming” campaign evolved beyond simple credential theft. Security researchers discovered the attackers were leveraging compromised credentials to gain access to developer accounts and then automatically inject malicious code into legitimate packages managed by those developers. This is a key characteristic of the campaign and substantially increases its impact.
* Sources: (Same as above, all reports detail this evolution)
* Sonatype Blog
* Checkmarx Blog
* ReversingLabs Blog
Claim 3: Sonatype researchers state that the automation makes classic detection methods obsolete and that post-download detection is “fundamentally inadequate.”
* Verification: This is a valid interpretation of Sonatype’s findings. The sheer volume of malicious packages (17,000/day as stated) overwhelms conventional signature-based and behavioral analysis detection methods after a developer has already downloaded and integrated the compromised package. The speed of injection and the scale of the campaign necessitate a shift to preventative measures.
* Sources:
* Sonatype Blog – The report explicitly argues for a shift to preventative security measures.
Claim 4: Security must now intervene upstream with “Repository Firewalls” to block attacks before they reach the developer.
* Verification: This is the recommended mitigation strategy advocated by Sonatype and other security firms.Repository Firewalls (or similar technologies like Software Composition Analysis (SCA) with blocking capabilities) are designed to analyze packages before they are downloaded, identifying and blocking malicious or vulnerable components.
* Sources:
* Sonatype Blog – The report heavily promotes the use of Repository Firewalls.
* General industry best practices for supply chain security.
Breaking News Check (as of January 19,2026,00:52:03 UTC):
The “Second Coming” campaign was most active in late 2023 and early 2024. while the initial wave of attacks has subsided, the underlying techniques and the threat of similar campaigns remain. there have been ongoing reports of typosquatting and supply chain attacks targeting npm and other package repositories.Security researchers continue to emphasize the importance of preventative security measures. No major new developments directly related to the original “Second Coming” campaign have emerged in the last several months, but the threat landscape remains highly active. Several new, similar campaigns have been identified, demonstrating the continued viability of this attack vector.
Conclusion:
The information
