{"id":3950,"date":"2026-04-29T14:11:25","date_gmt":"2026-04-29T14:11:25","guid":{"rendered":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/2026\/04\/29\/cyber-threats-to-devops-platforms-rising-fast-gitprotect-report-finds\/"},"modified":"2026-04-29T14:11:25","modified_gmt":"2026-04-29T14:11:25","slug":"cyber-threats-to-devops-platforms-rising-fast-gitprotect-report-finds","status":"publish","type":"post","link":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/2026\/04\/29\/cyber-threats-to-devops-platforms-rising-fast-gitprotect-report-finds\/","title":{"rendered":"Cyber Threats to DevOps Platforms Rising Fast, GitProtect Report Finds"},"content":{"rendered":"<div><img data-opt-id=1770610259  fetchpriority=\"high\" decoding=\"async\" width=\"770\" height=\"330\" src=\"https:\/\/devops.com\/wp-content\/uploads\/2020\/05\/Shadow-Code-Security.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"security, speed, DevOps\" \/><\/div>\n<p><img data-opt-id=1686176869  fetchpriority=\"high\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/devops.com\/wp-content\/uploads\/2020\/05\/Shadow-Code-Security-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"security, speed, DevOps\" \/><\/p>\n<p>Software developers, CI\/CD pipelines, and the tools they rely on are increasingly becoming <a href=\"https:\/\/devops.com\/devops-platforms-show-cracks-github-incidents-surge-58-azure-gitlab-and-jira-also-under-pressure\/\" target=\"_blank\" rel=\"noopener\">attractive targets for threat groups<\/a>. The number of <a href=\"https:\/\/devops.com\/bad-actor-drops-36-malicious-packages-in-npm-targets-guardarian-users\/\" target=\"_blank\" rel=\"noopener\">cyberattacks on code repositories<\/a> like npm and GitHub continues to mount as threat actors push their supply chain attacks.<\/p>\n<p>Compromising open source packages, fake development tools, and social engineering are among the tactics bad actors use against developers. Researchers with Kaspersky Lab this month wrote that a <a href=\"https:\/\/www.kaspersky.com\/blog\/why-hackers-target-developers\/55630\/\" target=\"_blank\" rel=\"noopener\">combination<\/a> of programmers\u2019 unfounded belief that they are good at spotting threats and jobs that require them to often download and run third-party code \u201cmakes them sitting ducks for cyberattackers.\u201d<\/p>\n<p>GitProtect.io analyst this week detailed the mounting and evolving threats facing developers and their operations. In its <a href=\"http:\/\/gitprotect.io\/devops-threats-unwrapped-2026.html\" target=\"_blank\" rel=\"noopener\">DevOps Threats Unwrapped Report 2026<\/a>, the DevOps backup and recovery specialists found that the number of incidents targeting DevOps environments in 2025 grew 21% year-over-year, and that the number of hours of impacted performance those incidents caused doubled to 9,255, costing more than $740,000 in lost engineering productivity.<\/p>\n<p>The numbers in the report are based on publicly available information published by vendors on their status pages, security advisories, databases, and publicly reported incidents, according to GitProtect.<\/p>\n<h3>\u2018A Playground for Cyber Criminals\u2019<\/h3>\n<p>\u201cWhat could we remember 2025 for when it comes to DevOps threats?\u201d Daria Kulikova, head of GitProtect Lab, wrote in the report. \u201cIt was a year when trusted development platforms, automation pipelines, and cloud identities became a playground for cyber criminals. Attackers leveraged platforms such as GitHub, GitLab, Atlassian, and Microsoft as part of their malware campaigns \u2013 they used trusted DevOps platforms as malware distribution channels, command-and-control infrastructure, and credential harvesting pipelines.\u201d<\/p>\n<p>Kulikova pointed to how various campaigns \u2013 such as <a href=\"https:\/\/devops.com\/attackers-testing-new-strain-of-shai-hulud-on-npm-aikido\/\" target=\"_blank\" rel=\"noopener\">Shai-Hulud<\/a>, <a href=\"https:\/\/blog.gitguardian.com\/ghostaction-campaign-3-325-secrets-stolen\/\" target=\"_blank\" rel=\"noopener\">GhostAction<\/a>, <a href=\"https:\/\/securityboulevard.com\/2025\/09\/gpugate-malware-shows-hardware-specific-evasion-tactics-arctic-wolf\/\" target=\"_blank\" rel=\"noopener\">GPUGate<\/a>, and <a href=\"https:\/\/securelist.com\/gitvenom-campaign\/115694\/\" target=\"_blank\" rel=\"noopener\">GitVenom<\/a> \u2013 abused automation and stole tokens to compromise repositories, listed a range of malware families like PyStoreRAT, SmartLoader, Lumma Stealer, and AsyncRAT that were distributed through fake libraries, poisoned packages, and other means, and noted that AI-generated repositories and dormant accounts were used for credential theft and covert reconnaissance.<\/p>\n<p>\u201cHowever, attackers weren\u02bct only limited to distributing the code on DevOps platforms,\u201d she wrote. \u201cIdentity was another attack direction. Hackers abused OAuth flows, long-lived Personal Access Tokens (PATs), and MFA-bypassing phishing kits to bypass defenses on Microsoft 365, GitHub, and collaboration tools at scale.\u201d<\/p>\n<h3>By the Numbers<\/h3>\n<p>The numbers in the report illustrate the turn bad actors are taking toward developers. In 2024, GitHub, GitLab, Azure DevOps and Jira saw a total of 364 incidents, and that number jumped last year to 607, about a 40% rise. Among those incidents, 156 were critical or major events that consumed more than 1,750 hours of downtime, a 69% increase in high-severity disruptions from 2024, when there were only 48 such cases.<\/p>\n<p>The need to patch software vulnerabilities also grew throughout 2025, according to the report. In all, vendors reported 236 security flaws that were patched across DevOps services, with 14 deemed critical, with a CVSS severity score of 9.0 or higher, and another 126 given high-severity ratings.<\/p>\n<p>In addition, there was a 30% increase in patched vulnerabilities between the first and second halves of the year, Kulikova wrote.<\/p>\n<h3>Downtime Increases<\/h3>\n<p>The downtime caused by the growing number and severity of incidents was significant, according to the analysts. While the while there was the 21% increase in the number of incidents \u2013 from 502 in 2024 to 607 last year \u2013 and total downtime jumped almost 95%, from 4,755 hours to 9,225. The frequency of the disruptions didn\u2019t just grow, but became more difficult to resolve, they wrote.<\/p>\n<p>About 62% of the outages of DevOps platforms were driven by the degraded performance caused by attacks, according to GitProtect\u2019s numbers. That said, they accounted for only 34% of the total downtime. Maintenance that needed to be done following incidents \u2013 which made up only 4% of the total number of outages \u2013 consumed 30% of the lost time, showing that planned and unplanned maintenance was the primary reasons for platforms not being available.<\/p>\n<h3>Some Things Stay the Same<\/h3>\n<p>There are some areas that didn\u2019t change much year-to-year, according to the report. The technology and software sectors were still the most targeted, with others like telecommunications, automotive, and education also in the crosshairs, and ransomware and extortion groups, such as Hellcat and Crimson Collective, were behind a large number of data breaches, which targeted high-profile companies like Red Hat, Nissan, and Europcar.<\/p>\n<p>\u201cAs attackers blend trusted platforms, hardware-aware evasion, malicious AI-generated code, and phishing-as-a-service into their arsenals, the 2025 threat landscape makes one thing clear: traditional perimeter defenses and reactive monitoring are no longer enough,\u201d Kulikova wrote. \u201cOrganizations need to ensure the resilience of their environment.\u201d<\/p>\n<p><a href=\"https:\/\/devops.com\/cyber-threats-to-devops-platforms-rising-fast-gitprotect-report-finds\/\" target=\"_blank\" class=\"feedzy-rss-link-icon\">Read More<\/a><\/p>\n<p>\u200b<\/p>","protected":false},"excerpt":{"rendered":"<p>Software developers, CI\/CD pipelines, and the tools they rely on are increasingly becoming attractive targets for threat groups. The number [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3951,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5],"tags":[],"class_list":["post-3950","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devops"],"_links":{"self":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/posts\/3950","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/comments?post=3950"}],"version-history":[{"count":0,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/posts\/3950\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/media\/3951"}],"wp:attachment":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/media?parent=3950"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/categories?post=3950"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/tags?post=3950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}