Automatically translated.View original post

In 2025, Open Source type malware has a high outbreak.

In 2025, Open Source type malware has a very high outbreak.

The term Open Source, or software development model in which the source code is made public for other developers to develop, is a huge benefit to the software industry. But when this model is applied to malware, it can also become a terrible threat.

According to a report by the website, SC World mentioned the growth of open source malware. According to a report from The Cyber Press, there are 454,000 new malware types in 2025. These malware are often deposited on many famous digital archives (Repo or Repository) - PyPI, Hugging Face, NuGet, Maven Central, and npm. With amazing download figures, there are 9.8 trillion downloads of these dangerous malware.

The source also revealed that open source malware is the most common on npm. The purpose of these malware is diverse and complex, covering a range of passwords theft, multi-stages attacks. In addition, self-copying malware has been detected. According to the report "State of the Software Supply Chain," by a research team from Sonatype, a cybersecurity solution developer, some hackers have the ability to fly systems at very high speeds. Firing up to 150,000 malware packets into the system within a day, as well as having the ability to steal Hijacking, a reliable system to release malware. These campaigns can be successfully committed due to the development of cyberterrorism that has caught up with the defense system and can ultimately be defeated.

# Programmer # Trending # Lemon 8 Howtoo # lemon 8 diary # freedomhack

2/18 Edited to

... Read moreจากประสบการณ์ส่วนตัวที่ทำงานเกี่ยวกับพัฒนาและดูแลระบบซอฟต์แวร์ พบว่าในช่วงปี 2025 นี้ มัลแวร์ Open Source กลายเป็นภัยคุกคามที่ต้องให้ความสำคัญมากขึ้น เพราะพฤติกรรมของมันที่มักแฝงตัวอยู่ใน Repository สาธารณะ เช่น npm หรือ PyPI ทำให้หลายโปรเจ็กต์ที่ใช้ไลบรารีเหล่านี้มีโอกาสโดนโจมตีได้ง่ายขึ้น สิ่งที่ผมสังเกตเห็นคือมัลแวร์กลุ่มนี้ไม่ได้แค่ขโมยข้อมูลอย่างเดียว บางประเภทยังมีฟีเจอร์ซับซ้อน เช่น การทำ Multi-Stages Attack ที่แฮกเกอร์จะเข้ามาโจมตีเป็นขั้นตอนอย่างละเอียด หรือแม้กระทั่งมัลแวร์ที่สามารถคัดลอกตัวเอง (Self-Replication) ซึ่งทำให้เกิดการระบาดอย่างรวดเร็วและยากต่อการจัดการ จากข้อมูลภาพ OCR ที่แสดงเปอร์เซ็นต์ของมัลแวร์แต่ละประเภทอย่าง Backdoor, Dropper, Obfuscated Code รวมถึงการโจมตีด้วย Crypto และการขโมยข้อมูล (Exfil) ก็สะท้อนให้เห็นว่ามัลแวร์ Open Source มีการใช้งานเทคนิคที่หลากหลายและซับซ้อนมากขึ้น การที่แฮกเกอร์สามารถ Flood ระบบด้วยแพ็กเก็ตมัลแวร์ถึง 150,000 แพ็คเก็ตต่อวัน แสดงให้เห็นว่าการป้องกันเพียงแค่รูปแบบเดิมๆ อาจไม่เพียงพอ ดังนั้น ผู้พัฒนาโปรแกรมและผู้ดูแลระบบควรระมัดระวังในการเลือกใช้ไลบรารี ตรวจสอบความน่าเชื่อถือของ Repository และติดตั้งเครื่องมือสแกนมัลแวร์ในโค้ดก่อนนำไปใช้งานจริง นอกจากนี้ การตั้งระบบแจ้งเตือนและแนวทางการตอบสนองเมื่อตรวจพบพฤติกรรมผิดปกติก็สำคัญมากเช่นกัน สุดท้ายแล้ว การที่โมเดล Open Source ถูกนำมาใช้สร้างมัลแวร์ไม่ได้หมายความว่าโซลูชัน Open Source ไร้ประโยชน์ เพียงแต่ต้องมีความรู้และระมัดระวังมากขึ้น เพื่อให้ข้อดีของ Open Source ยังคงอยู่ และลดความเสี่ยงจากภัยคุกคามไซเบอร์ในยุคดิจิทัลนี้ได้อย่างมีประสิทธิภาพ

Related posts

Tools and sites I use as a cybersecurity student 🌸
#cybersecuritystudent #cybersecurity #techgirlie
LexiStudies

LexiStudies

102 likes

Developing a career in cybersecurity
Hey All! 👋 Want to stay safe online and protect your data? Cybersecurity knowledge is essential. It helps you secure your personal information and understand how to safeguard your digital footprint. Let’s dive into why it’s crucial! 💻🔒 Why Cybersecurity Matters Cybersecurity is about protecting
Meghana

Meghana

547 likes

It's no secret that Karol G just slayed the #Grammys #Glambot . #AwardsSeason
user6854050772614

user6854050772614

5 likes

Why I switched to taking notes on my iPad
I used to love writing in notebooks, but after switching to my iPad, I can confidently say I’m never going back! Here’s why: ✨ Cuter Notes – Let’s be real…aesthetic notes make studying more enjoyable! I can use custom colors, cute stickers, and different handwriting styles to make my notes visua
Rebecca R.

Rebecca R.

262 likes

Liberty Prime Full Story | Fallout Lore
#bosbird #fallouttvshow #fallout4 #fallout76 #fallout
BOSBird

BOSBird

1 like

kevin washington

kevin washington

968 likes

Nashville, Tennessee 2020
Nocturnal tornado outbreak.
swrl 🌪️

swrl 🌪️

3 likes

+it’s less than 80$✨❗️LINK for this item in my bio❗️
Details⬇️: This flip phone smartphone with a flip keyboard design, offering both the convenience of a traditional keypad and the functionality of a modern touchscreen device. With 4GB of internal storage, you'll have plenty of space for apps, photos, and more. The compact 3.5" displa
Atlas

Atlas

443 likes

🧠 Would YOU plug in a random USB? Jamie did… and almost let hackers into his system. ⚠️ This comic shows a real cybersecurity trick: USB Baiting — where attackers drop infected drives hoping someone connects them. 👀 Learn what a Trojan is 🔐 Discover how to spot dangerous files 💬 Drop a 🛑
CyberSnack

CyberSnack

1 like

Elite Hacker Destroyed His Empire By Forgetting On
Bro, I really forgot to use a VPN 💀 #hacker #cybercrime #fail #tech #arrestedstupidly
arrestedstupidly

arrestedstupidly

1 like

😫 Wanting to quit your 9-5?
Becoming a Pinterest Manager might be for you! In less than a year, I went from earning $2K at my 9-5 to over $4K/month with Pinterest management alone. Now, with all the different skills and platforms I lesrned, I make anywhere from $12-15K A MONTH! Back then, I knew I had to do something
Bria | Monetize with AI 🤖

Bria | Monetize with AI 🤖

482 likes

You need TikTok ?
Here is how you can download TikTok if you need help with and apple phone just ask me I can help with Apple phone you need to change your region on the Apple Pay store
Ali

Ali

10 likes

SOS!!! Wha do you do if you click a phishing email link… two times?!? So far I have: 1, added two factor sign on 2, changed my passwords 3, stress cried and spiraled But for real. What do you do… how do I know if there is now malware (? Is that what it’s called ?) living on my computer?!?
Alexandra Wildeson

Alexandra Wildeson

2 likes

Tips for pursuing a career in cybersecurity
1. Build a Strong Technical Foundation A solid understanding of systems, networks, and programming is essential for identifying and mitigating security threats. • Learn networking basics (e.g., TCP/IP, firewalls, VPNs). • Gain familiarity with operating systems (Windows, Linux)
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

129 likes

Recover Hidden Files from USB Using Command Prompt
Can’t see your files on a USB stick even though they’re there? This video shows how to use Command Prompt commands (like attrib) to unhide files hidden by system attributes or viruses — plus what to try if that doesn’t work. #USB #cmdanks #digitallifestyle #techtutorial #newonlemon8
XanthusTechCore

XanthusTechCore

2 likes

productivity apps on your mac!
Proton VPN for staying secure online and Grammarly for making sure I don’t send embarrassing emails literally two apps I use daily to stay productive without the stress. If you’re not using them yet, you’re missing out! #lemon8partner #lemon8creator #tech #apps #productivity
asmae🐸

asmae🐸

19 likes

Back Up Outlook Emails to an External Hard Drive
Need to back up your Outlook emails to an external hard drive? Here are 2 simple methods to help you out. Download AOMEI Backupper and give it a try! #backup #outlook #externalharddrive
SmoothTechie

SmoothTechie

1 like

Just Finished!!
Finger painting is awesome!! I don’t have my brushes with me so i decided to finger paint, it’s even better than i imagined it’d turn out!! I may or may not sell this painting, but I will have lots more to share like this!! ⭐️Overall rating: 10/10 #paintingmyselfhappy #painting 🎨 #hel
✨🖤alexandria🖤✨

✨🖤alexandria🖤✨

50 likes

Don’t Use Airport USB Chargers!
TSA is now advising NOT to use Airport USB Chargers. Bring your own USB charging bricks. "Hackers can install malware at USB ports (we’ve been told that’s called 'juice/port jacking'). So, when you’re at an airport do not plug your phone directly into a USB port. Bring your TSA-compl
Destination & Travel Junkies

Destination & Travel Junkies

151 likes

This sucks, but it can be fixed!
Rachel Gilmore

Rachel Gilmore

9 likes

🏰✨Disney Tattoos✨🏰
Did you know, I’m a HUGE Disney nerd! It’s always a treat whenever I get to do something based on Disney, small or big, flash or custom 🥰 Here’s just a small compilation of some of my favorites! #disney #disneytattoo #tattoo #tattooartist #traditionaltattoo
Malware 🔜 FC

Malware 🔜 FC

375 likes

CYBER WEAPONS CAN CRASH NATIONS IN SECONDS
Zona

Zona

4 likes

New macOS Malware
New malware targeting macOS with an information stealer program that is designed to take your online information. #macos #cyber
Lemon8er

Lemon8er

0 likes

Top Cybersecurity Certificates
There are several reputable cybersecurity certifications that can help you advance your skills and knowledge in the field of cybersecurity. 1. Certified Information Systems Security Professional (CISSP): - CISSP is a globally recognized certification that covers a wide range of cybersecurit
anjali.gama

anjali.gama

110 likes

A series I’ve wanted to do forever! As a cyber security expert and bridal makeup artist I hope to share cyber concepts in easy to understand makeup metaphors! Let me know in the comments what topics interest you 💕 #makeupandmalware #mascara #cybersecurity @Lancôme
Betsy H

Betsy H

3 likes

The sneakiest IRS scams to know about😏
IRS scams are getting trickier every year and I don’t want anyone here getting caught slipping. I’m breaking down the sneakiest scams you NEED to know about to protect your money and identity. If you’ve ever been unsure about a sketchy call, text, or email, drop “PROTECT ME” in the comments and I’
Shaniqua Financebabe

Shaniqua Financebabe

9 likes

Journal Spreads ive done recently
okay its been a few months but so far i did great with all the stickers i love buyings stickers now as a comfort thing idk how to say it ig? but overall my journal spreads look so good so far i hope yall like it js as much as i do<3 anywho im waiting for an upcoming concert to add i cant wait to
mal<3

mal<3

162 likes

Check out this website that helps you when you’re feeling uninspired! I walk you thru the process of downloading the svg file to taking it to cricut design space! Happy crafting. #designinspo #creativeart #cricutprojects #svgfiles #CricutTips
VlunaWorks

VlunaWorks

30 likes

Never plug your phone or computer into usb plugs in hotels or airports here’s why 👇🏼 A USB port doesn’t just deliver power, it can also transfer data. A compromised hotel USB outlet could secretly install malware on your phone or copy your data without you realizing it. Hotels, airports, and o
Cybersecurity Girl

Cybersecurity Girl

146 likes

Handling Risk Like a Pro: 4 Paths to Security
In cybersecurity, you can’t erase risk, but you can choose how to deal with it. Avoid, Mitigate, Transfer, or Accept: four strategies every organization needs to survive in the digital battlefield. 🪞 Reflection techniques: #creatorsearchinsights #fypシ #cybersecurity #infosec #techtip
Abby❤️💎

Abby❤️💎

0 likes

WGU D488 – CYBERSECURITY ARCHITECTURE & ENGINEERIN
#AskLemon8 #study #wgu
EXAMCOLLECTIVES

EXAMCOLLECTIVES

1 like

Ten easy ways to spot a scam
That's a great request! Let's simplify those scam-spotting tools down to the absolute basics, using language even a child can remember. Here are ten easy rules, like a checklist, for staying safe: The 10 Super-Simple Scam Rules | Rule | What to Look For | The Simple Tool | |---|---|---|
Dragonak1754

Dragonak1754

5 likes

In this img, I strip back the layers of a malware
STOP installing random .exe files! 🛑 This 'Physics Simulator' is actually malware in disguise. See how it hooks your keyboard in the background. Tag a friend who downloads too many mods. #cybersecurity #scamalert #keylogger
ShadowRoot17

ShadowRoot17

1 like

Malicious Android App
Cybercriminals are using fake ATT apps to distribute malware #cybersecurity #Android
Lemon8er

Lemon8er

0 likes

🚨 16 Billion passwords leaked - the largest breach ever 🚨 Here is how it happened and what you can do to be safe. #news #databreach #cybersecuritytips #onlinesafety
Cybersecurity Girl

Cybersecurity Girl

83 likes

The Podcast Invite Scheme! Always remember - it’s not your fault ♥️ this happens to so many people. Most importantly: STAY SUSPICIOUS OF EVERYTHING 🥰💕 #podcastinvite #podcast #creator #storytime #scheme
Chloe

Chloe

66 likes

4 Ways to Protect Yourself from Bird Flu (cdc)
#birdflu #birdfluoutbreak
DrJenCaudle

DrJenCaudle

5 likes

Day 3 of 31: 31 days to a safer you. Did you know hackers can turn on your webcam without you ever noticing? 🎥👀 it happens when malware sneaks onto your device and gives cybercriminals access to your camera. That means your most private moments could be exposed. ✅ Here’s how to protect yours
Cybersecurity Girl

Cybersecurity Girl

21 likes

Setting Spray is the makeup equivalent to mulifactor authentication and it’s a must have! Follow along to learn more about cybersecurity from a pro makeup artist and cyber expert 🤌🏻
Betsy H

Betsy H

1 like

Vintage Measles Remedies
With measles cases reportedly on the rise, we felt it was the perfect time to dust off some older—but still valuable—wisdom on the subject. This vintage remedy guide offers some useful herbal suggestions worth revisiting. While we don’t endorse the use of carbolated Vaseline (a petroleum jelly mixe
Soil & Spirit

Soil & Spirit

2 likes

This is the newest way people are getting hacked and if you use AI to answer your questions and give you advice, you need to watch this.Thanks to Huntress for reporting this Follow for more
Cybersecurity Girl

Cybersecurity Girl

15 likes

Bible Bestie
100 unique templates for you to add your Bible study notes to! Journaling mad fun and easy! Available on Amazon!
Bible Bestie & Prayer Bestie

Bible Bestie & Prayer Bestie

3 likes

Gas prices, egg prices, grocery prices - what's the truth? 🤔 #tiktok #news #information #newmexico #story
heins.vivianne0650

heins.vivianne0650

0 likes

the best VPN for all your needs!
NordVPN is a great tool to have if you want to access all websites from any region! (traveling or not). It keeps your connection secure on public Wi-Fi, protecting your data from hackers. Plus, it lets you access academic resources or websites that might be restricted in certain countries if you ar
Anaïs D’Ottavio

Anaïs D’Ottavio

12 likes

See more