TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home Tech Security
Pentagon: Open-source software under attack by foreign adversaries

Pentagon: Open-source software under attack by foreign adversaries

The U.S. military says foreign actors are exploiting open-source code transparency to plant backdoors in critical infrastructure systems.

Aytun ÇelebibyAytun Çelebi
4 August 2025
in Security, Tech
Reading Time: 3 mins read
Share on FacebookShare on Twitter

A senior U.S. military commander has issued a stark warning about coordinated efforts by foreign adversaries to compromise America’s digital infrastructure through open-source software vulnerabilities. Gen. Paul M. Nakasone, Commander of U.S. Cyber Command, testified before the Senate Armed Services Committee that China and Russia are actively inserting malicious code into publicly available software utilized across critical U.S. sectors.

The targeted open-source software forms the backbone of operations within multiple vital sectors of American infrastructure. Gen. Nakasone emphasized that these compromised programs are “widely used by the U.S. military, government and private sector,” creating systemic vulnerabilities. Open-source software’s inherent transparency—being publicly accessible and modifiable by anyone—makes it particularly susceptible to such nation-state infiltration despite its widespread adoption in essential systems including power grids and telecommunications networks.

“We’re seeing it in a number of different ways,” Nakasone stated during the hearing. “We’re seeing our adversaries, in particular China and Russia, [engaging] in the insertion of malicious code in open-source software.” The general stressed the sophisticated nature of these covert operations, which aim to establish persistent access points within American digital ecosystems.

This revelation builds upon heightened concerns about software supply chain security following the devastating 2020 SolarWinds cyberattack. That incident, attributed to Russian state-sponsored hackers, compromised networks across multiple U.S. government agencies and private corporations by exploiting trusted software update mechanisms. The breach exposed fundamental weaknesses in how organizations vet third-party software components.

The U.S. government has intensified its focus on securing the software supply chain in recent years. These concerns culminated in President Biden’s May 2025 executive order mandating comprehensive cybersecurity improvements, with specific provisions addressing supply chain vulnerabilities. The order established enhanced security standards for software sold to the federal government and created stricter reporting requirements for cyber incidents.

Nakasone described the current threat as being taken “extraordinarily seriously” at the highest levels of government. Cyber Command is collaborating extensively with private sector partners to identify and neutralize the implanted malicious code. “We’re working very closely with our partners in the private sector to be able to identify this,” he confirmed, highlighting the essential role of industry collaboration in national cyber defense.

The general specifically called for reinforced protective measures around America’s software supply chain, labeling current safeguards insufficient against sophisticated nation-state actors. He noted that adversaries exploit the interconnected nature of modern software development, where open-source components are routinely integrated into commercial products and government systems without thorough security vetting.

Nakasone framed the challenge as global in scale, emphasizing that unilateral action would be insufficient. “This is a global challenge, and we need to work together to address it,” he asserted, advocating for strengthened alliances to collectively counter digital threats. The involvement of both China and Russia indicates a strategic convergence among cyber adversaries that demands coordinated international cybersecurity policies and intelligence sharing.

Security analysts note that open-source compromises represent a force-multiplier for hostile nations, enabling them to simultaneously target thousands of organizations through single-point vulnerabilities. Unlike traditional cyberattacks that require individual network penetration, poisoned software components can automatically distribute malware to all users during routine updates.

The warning underscores the evolving nature of cyber warfare, where attacks increasingly occur long before detection through compromised development tools and software dependencies. Cybersecurity experts observe that such tactics reflect a strategic shift toward “pre-positioning” within software ecosystems to enable future disruptive operations.

Federal agencies are reportedly developing new frameworks for validating software integrity, including enhanced code-signing requirements and software bill of materials (SBOM) implementation. The administration is also considering incentives for open-source maintainers to adopt improved security practices, acknowledging that many critical projects operate with limited resources despite their widespread deployment in critical infrastructure.

As threats to America’s digital foundations continue evolving, the testimony highlights the urgent need for comprehensive strategies that bridge governmental, private sector, and international efforts to secure the increasingly complex software supply chain landscape against sophisticated nation-state threats.

ShareTweet
Aytun Çelebi

Aytun Çelebi

Starting with coding on Commodore 64 in elementary school moving to web programming in his teenage years, Aytun has been around technology for over 30 years, and he has been a tech journalist for over 20 years now. He worked in many major Turkish outlets (newspapers, magazines, TV channels and websites) and managed some. Besides journalism, he worked as a copywriter and PR manager (for Lenovo, HP and many international brands ) in agencies. He founded his agency, Linkmedya in 2019 to execute his way of producing content. He is recently interested in AI, automation and MarTech.

Related Posts

Bluesky opens “Live Now” badges to all users to lure Twitch creators

Bluesky opens “Live Now” badges to all users to lure Twitch creators

16 January 2026
Paramount+ slams subscribers with first price hike since 2024

Paramount+ slams subscribers with first price hike since 2024

16 January 2026
Ashley St. Clair sues xAI over Grok deepfakes

Ashley St. Clair sues xAI over Grok deepfakes

16 January 2026
Samsung launches instant-play cloud streaming in Mobile Gaming Hub update

Samsung launches instant-play cloud streaming in Mobile Gaming Hub update

16 January 2026

LATEST

OpenAI rockets $250 million into Altman’s Merge Labs brain-AI bridge

Bluesky opens “Live Now” badges to all users to lure Twitch creators

Capcom reveals Resident Evil: Requiem classic mode and ink ribbons

How to tell if your iPhone or Android phone is carrier unlocked

Paramount+ slams subscribers with first price hike since 2024

Ashley St. Clair sues xAI over Grok deepfakes

Samsung launches instant-play cloud streaming in Mobile Gaming Hub update

Netflix secures Sony Pictures first-to-stream rights

How to apply screen protectors without air bubbles

How to check if someone read your message on iPhone or iPad

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska