Malicious packages on npm, PyPI, and other registries increased 156% year-over-year to over 512,000 in 2024, and registries lack the staff to review them

technology0 views
Sonatype's 2024 State of the Software Supply Chain report documented 512,847 malicious packages discovered across open source registries in a single year, a 156% increase over the previous year, with techniques including typosquatting, dependency confusion, and protestware. In 2025, malware on open source platforms rose a further 73%. Why it matters: developers install malicious packages that steal credentials, SSH keys, and crypto wallets from development machines, so compromised developer credentials provide access to production systems and source code repositories, so attackers use stolen npm tokens to publish trojanized versions of legitimate packages, so the malicious package becomes a force multiplier infecting all downstream consumers, so trust in the entire open source package ecosystem erodes, slowing adoption and increasing costs. The structural root cause is that package registries like npm (with 2.5+ million packages) and PyPI operate with minimal staff -- npm has no pre-publication security review, anyone can publish any package name, and the registries rely on post-hoc detection by volunteer security researchers and automated scanners rather than preventing malicious uploads, because the registries were designed for developer convenience in an era before software supply chain attacks became industrialized.

Evidence

Sonatype's 2024 report logged 512,847 malicious packages (156% YoY increase). In October 2024, researchers found 287 typosquatted npm packages impersonating Puppeteer and crypto libraries using blockchain-based C2 infrastructure (The Register, November 2024). In late 2024, fake @typescript_eslinter/eslint and types-node packages deployed trojans (The Hacker News, December 2024). The PhantomRaven campaign in 2025 delivered multi-platform infostealers via 126 malicious npm packages. A November 2025 attack typosquatted @actions/artifact as @acitons/artifact targeting GitHub Actions (Veracode). ReversingLabs' 2026 Software Supply Chain Security Report confirmed malware on open source platforms was up 73% in 2025.

Comments