Close Menu
Şevket Ayaksız

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Google Maps vs Waze: I Put the Two Best Navigation Apps Head-to-Head — and One Clearly Came Out on Top

    Mayıs 1, 2026

    Samsung Electronics Offers Free 32-Inch Odyssey gaming monitor: Eligibility and How to Claim Deal

    Mayıs 1, 2026

    T-Mobile Bundles Free Hulu and Netflix for 5G Users: Eligibility Explained

    Mayıs 1, 2026
    Facebook X (Twitter) Instagram
    • software
    • Gadgets
    Facebook X (Twitter) Instagram
    Şevket AyaksızŞevket Ayaksız
    Subscribe
    • Home
    • Technology

      Google Maps vs Waze: I Put the Two Best Navigation Apps Head-to-Head — and One Clearly Came Out on Top

      Mayıs 1, 2026

      T-Mobile Bundles Free Hulu and Netflix for 5G Users: Eligibility Explained

      Mayıs 1, 2026

      This Portable Mini PC Is the Unexpected Raspberry Pi Alternative You Might Actually Want

      Mayıs 1, 2026

      Samsung warns RAM shortages could worsen beyond 2027

      Mayıs 1, 2026

      Oxford study finds friendly AI chatbots are less accurate

      Mayıs 1, 2026
    • Adobe
    • Microsoft
    • java
    • Oracle
    Şevket Ayaksız
    Anasayfa » Trojanized Versions Emerge After Supply Chain Breach in Ultralytics AI Library
    software

    Trojanized Versions Emerge After Supply Chain Breach in Ultralytics AI Library

    By mustafa efeOcak 12, 2025Yorum yapılmamış2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In a recent breach, attackers targeted Ultralytics YOLO packages on PyPI, the official Python package index, compromising a popular library used for developing custom machine learning models. By infiltrating the build environment of this widely used tool, the attackers were able to deploy cryptocurrency mining malware onto the systems that installed the trojanized version of the package. While cryptocurrency mining was the malware’s payload, the attackers could have used this vulnerability to introduce any type of malicious software.

    The method behind the attack was a known exploit involving GitHub Actions, an automation tool that runs tasks like code builds. The attackers exploited this vector to inject malicious code into the package during its automated build process. This allowed the attackers to bypass the usual code review mechanisms and inject the harmful code directly into the version uploaded to PyPI, while the repository on GitHub remained untouched. This method proved to be a highly effective way of compromising the distribution pipeline without leaving traces in the original source code.

    The compromised version of Ultralytics YOLO, identified as version 8.3.41, was published on December 4. Just a day later, on December 5, the Ultralytics team was alerted to the breach and attempted to release a patch with version 8.3.42. However, because they initially lacked a full understanding of how the compromise occurred, the new version inadvertently included the same malicious code. It wasn’t until later that day, when the root cause of the breach was identified, that the Ultralytics team released a clean and secure version, 8.3.43, to resolve the issue.

    Ultralytics YOLO is a significant project within the AI community, with over 30,000 stars and more than 6,000 forks on GitHub. The PyPI package itself has seen almost 60 million downloads throughout its lifespan. This attack mirrors a recent compromise in another major project, @solana/web3.js, but differs in its method. While the Solana breach was caused by a compromised maintainer account, the Ultralytics attack was a more sophisticated attack on the build environment, exploiting a known vulnerability in GitHub Actions Script Injection, a technique that had previously been flagged by security researcher Adnan Khan. This highlights the growing complexity and sophistication of supply chain attacks targeting popular open-source projects.

    Post Views: 223
    Data Management Programming Languages Software Development
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    mustafa efe
    • Website

    Related Posts

    Anthropic’s Claude Security Tool Analyzes Codebases to Detect Vulnerabilities and Prioritize Fixes

    Mayıs 1, 2026

    Microsoft’s Windows Insider Program Finally Becomes More Streamlined and User-Friendly

    Nisan 11, 2026

    Microsoft launches tool to gather user feedback on Windows issues

    Nisan 8, 2026
    Add A Comment

    Comments are closed.

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    Ocak 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    Ocak 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    Ocak 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By sevketayaksiz
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By sevketayaksiz
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By sevketayaksiz
    Advertisement
    Demo
    Şevket Ayaksız
    Facebook X (Twitter) Instagram YouTube
    • Home
    • Adobe
    • microsoft
    • java
    • Oracle
    • Contact
    © 2026 Theme Designed by Şevket Ayaksız.

    Type above and press Enter to search. Press Esc to cancel.