Important Notice: Due to the AWS outage, you may experience some technical issues while using our services today

Automate security governance across any AI coding environment for total confidence and built-from-source protection. → Learn More

CASE STUDY

Global Proprietary Trading Firm Hardens Python Supply Chain against Malicious Attacks with ActiveState

Share

INDUSTRY

Financial Services

CHALLENGES

  • Escalating threat from malicious actors targeting public open source ecosystems.
  • PyPI repository was forced to suspend new project creation due to an ongoing malware upload attack.
  • The “estimated 45% likelihood” of a supply chain attack by 2025 was a risk they could no longer ignore.

RESULTS

  • Zero Ingestion of Public Malware.
  • 45% Risk Mitigation.
  • Protected Trading Integrity.
  • Enterprise-Level Support.

Executive Summary

To protect its high-frequency trading operations from an increasingly hostile open source landscape, this global firm transitioned from public repositories to a fully vetted Python catalog. By using source-built libraries with verified provenance, they eliminated the risk of malware ingestion while securing their CI/CD pipelines. This proactive shift protects the firm from data breaches that cost an average of $4.45 million per incident.

About the Customer

The customer is a leading global proprietary trading firm that leverages high-frequency trading strategies to provide liquidity across diverse asset classes. Their business model relies on speed, precision, and the integrity of their automated trading algorithms. Python serves as a critical engine for their data analysis and trading infrastructure, making the security of their software supply chain a top operational priority.

The Challenge

As a high-profile financial entity, the firm faced an escalating threat from malicious actors targeting public open source ecosystems. In early 2024, the PyPI repository was forced to suspend new project creation due to an ongoing malware upload attack, highlighting the volatility of pulling code directly from public sources. For a firm where a single compromised package could lead to a catastrophic data breach or financial loss, the “estimated 45% likelihood” of a supply chain attack by 2025 was a risk they could no longer ignore.

The Solution

The firm implemented a “secure-by-default” approach by redirecting its developers away from public ecosystems. They adopted an ActiveState Enterprise subscription to provide a private, fully vetted catalog of Python libraries. Every library in this catalog is built from source code by ActiveState in a secure environment, ensuring that no pre-compiled, potentially malicious binaries ever enter the firm’s CI/CD pipelines.

The Results

The transition to a managed Python supply chain provided immediate security and financial safeguards:

  • Zero Ingestion of Public Malware: By cutting off direct pulls from public PyPI, the firm eliminated the primary vector for automated malware attacks.
  • 45% Risk Mitigation: The firm proactively addressed a threat category that Gartner projects will affect nearly half of all organizations by 2025.
  • Protected Trading Integrity: The move secured the code driving their high-frequency trading, protecting against breaches that average $4.45 million in damages.
  • Enterprise-Level Support: The firm gained access to dedicated service and support to maintain their secure libraries.

Defending the High-Frequency Frontier

A representative from the firm’s technology team noted that the move was a necessary evolution in their defense strategy given the 633% annual increase in supply chain attacks.

“Pulling code directly from public ecosystems left us vulnerable to data breaches in an increasingly risky environment,” they stated. By switching to a vetted catalog, the firm ensured their developers have the tools they need without exposing the business to unmanaged external threats.

What’s Next

The firm will continue to leverage the ActiveState Enterprise Tier to manage its Python dependencies, ensuring that as new libraries are required for trading strategies, they are delivered through a secure, source-built pipeline.

Additional Resources

Scroll to Top