How to Supercharge your Digital Marketing with Desire Paths
How to Supercharge your Digital Marketing with Desire Paths
12 Steps to Create Videos

Supply chain compromise of Ultralytics AI library results in trojanized versions [Video]

Categories
AI Behavioral Targeting

Attackers exploited a script injection vulnerability via GitHub Actions to inject malicious code during the automated build process, poisoning the resulting packages of the popular Python library.

Credit: Roman Samborskyi / Shutterstock

Attackers have compromised Ultralytics YOLO packages published on PyPI, the official Python package index, by compromising the build environment of the popular library for creating custom machine learning models. The malicious code deployed cryptocurrency mining malware on systems that installed the package, but the attackers could have delivered any type of malware.

According to researchers from ReversingLabs, the attackers leveraged a known exploit via GitHub Actions to introduce malicious code during the automated build process, therefore bypassing the usual code review process. As a result, the code was present only in the package pushed to PyPI and not in the code repository on GitHub.

The trojanized version of Ultralytics on PyPI (8.3.41) was published on Dec. 4. Ultralytics developers were alerted Dec. 5, …

5 Ways to Make Push Marketing Work for You
5 Ways to Make Push Marketing Work for You
5 Steps to Creating Successful Ads