
Hacker mindset: Why are DDoS attacks against the finance sector escalating?
Discover why DDoS attacks on financial services are rising – and what this reveals about the hacker mindset.
Read MoreIt’s been a tough quarter for open source security – and if you’re a developer working in a fast-moving CI/CD pipeline, it’s getting tougher.
According to Sonatype’s Open Source Malware Index for Q2 2025, 55% of malicious open source packages were designed for data exfiltration. That’s more than double the percentage in Q1, making it the most common malware objective this year – overtaking cryptominers, ransomware, and even trojans in volume and impact.
So what does this shift really mean for the developer community, especially in cloud-first environments like the ones booming across the MENA region?
The modern software supply chain is increasingly automated, distributed, and fast. And that’s exactly what makes it vulnerable. The same CI/CD pipelines that make rapid deployment possible can also be exploited to move malicious code at scale.
The Q2 report shows that most exfiltration-focused malware isn’t particularly noisy. It’s subtle, targeting .env files, credential stores, and SSH keys — anything that gives attackers a foothold in production infrastructure. These packages often use curl or HTTP requests to send secrets to attacker-controlled endpoints; or more worryingly, to insert backdoors directly into pipelines.
It’s important to note that this isn’t theoretical. The Sonatype team flagged packages such as peacenot, which was crafted specifically to target .env files and ship secrets off to a remote server – a tactic that’s becoming increasingly common.
As well as rogue developers uploading malicious packages, Sonatype noted a dramatic rise in activity linked to organised threat actors, including state-sponsored groups. Malware linked to North Korea’s Lazarus Group was embedded in dozens of open source packages that saw over 30,000 downloads combined – some of which were configured to exfiltrate sensitive data from compromised systems.
So for a growing number of attackers, developers aren’t just collateral damage. They’re a key target.
The MENA region has seen a surge in digital transformation projects – from fintech startups in Nigeria to economic diversification and government modernisation in Saudi Arabia and the UAE. Much of this innovation is being built on open source foundations, supported by cloud-native architectures and agile workflows.
That’s a good thing – but it also introduces risk.
Organisations that rely heavily on tools like GitHub Actions, Bitbucket Pipelines or GitLab CI/CD are at risk if secrets management isn’t airtight. Because .env files left exposed, hardcoded API keys, or poor role segmentation in cloud deployments can all turn a minor compromise into a serious breach.
If you’re building software in 2025, you need to assume your dependencies might be compromised. Here are a few must-dos:
We’ve been writing a lot about the hacker mindset here lately. And the shift towards data exfiltration tells us that attackers want what developers have. Credentials, access tokens, and secrets are coveted keys – and stealing them is often easier than breaking through hardened perimeters.
But the good news is that with a few critical changes, dev teams can turn their pipelines from soft targets into hardened assets. Because today, protecting your code is about guarding the infrastructure that builds it.
Join the newsletter to receive the latest updates in your inbox.
Discover why DDoS attacks on financial services are rising – and what this reveals about the hacker mindset.
Read MoreAre cyber hiring managers keeping pace with attackers? Discover key stats, expert insights, and the value of soft skills in cybersecurity.
Read MoreLearn what the recent New York Times vs. OpenAI case means for privacy officers and privacy policies – across all organisations that leverage generative AI.
Read More