Supply Chain Attack on Popular ML Tool Exposes User Credentials

By • min read

A widely used open-source package for monitoring machine learning systems was recently compromised in a sophisticated supply chain attack. The malicious version, downloaded over 1 million times per month, stole sensitive credentials from users’ systems before being removed.

The Incident: Compromised Package

On Friday, unknown threat actors exploited a vulnerability in the developer account workflow of element-data, a command-line interface (CLI) tool designed to help data scientists monitor performance and anomalies in machine-learning models. The attackers gained access to signing keys and other sensitive information, allowing them to push a malicious update to the package.

Supply Chain Attack on Popular ML Tool Exposes User Credentials
Source: feeds.arstechnica.com

The compromised version, 0.23.3, was published to both the Python Package Index (PyPI) and the official Docker image repository. Once installed and executed, the malicious code scoured the host system for valuable data, including user profiles, warehouse credentials, cloud provider keys, API tokens, and SSH keys. The malicious package remained available for approximately 12 hours before being taken down on Saturday.

What Was Affected

Only users who installed version 0.23.3 or who pulled and ran the affected Docker image were at risk. The developers confirmed that Elementary Cloud, the Elementary dbt package, and all other CLI versions were not compromised. However, the developers warned that anyone who ran the malicious version should assume that any credentials accessible to that environment may have been exposed.

How the Attack Unfolded

The attack exploited a weakness in the developers’ account verification and signing pipeline. Although the exact vulnerability has not been disclosed publicly, the incident underscores a growing trend: threat actors targeting the software supply chain by compromising developer accounts or build infrastructure.

What Was Exposed

The malicious payload was designed to harvest a wide range of sensitive information from the infected environment. According to the developers, the code searched for:

Recommended

Discover More

AI-Driven Vulnerability Discovery: How Enterprises Can Adapt to a Faster Threat LandscapeThe Onna-Bugeisha: Unveiling Japan's Female Samurai LegacyLinux Systems Face Unprecedented Risk as 'CopyFail' Exploit Goes PublicDesign Principles: A Practical Guide to Aligning Teams and Creating Better ProductsSEAL Framework: MIT's Breakthrough in Self-Improving Language Models