Close Menu
Şevket Ayaksız

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Google Maps vs Waze: I Put the Two Best Navigation Apps Head-to-Head — and One Clearly Came Out on Top

    Mayıs 1, 2026

    Samsung Electronics Offers Free 32-Inch Odyssey gaming monitor: Eligibility and How to Claim Deal

    Mayıs 1, 2026

    T-Mobile Bundles Free Hulu and Netflix for 5G Users: Eligibility Explained

    Mayıs 1, 2026
    Facebook X (Twitter) Instagram
    • software
    • Gadgets
    Facebook X (Twitter) Instagram
    Şevket AyaksızŞevket Ayaksız
    Subscribe
    • Home
    • Technology

      Google Maps vs Waze: I Put the Two Best Navigation Apps Head-to-Head — and One Clearly Came Out on Top

      Mayıs 1, 2026

      T-Mobile Bundles Free Hulu and Netflix for 5G Users: Eligibility Explained

      Mayıs 1, 2026

      This Portable Mini PC Is the Unexpected Raspberry Pi Alternative You Might Actually Want

      Mayıs 1, 2026

      Samsung warns RAM shortages could worsen beyond 2027

      Mayıs 1, 2026

      Oxford study finds friendly AI chatbots are less accurate

      Mayıs 1, 2026
    • Adobe
    • Microsoft
    • java
    • Oracle
    Şevket Ayaksız
    Anasayfa » Ultralytics AI Library Compromise Leads to Trojanized Versions in Supply Chain Attack
    software

    Ultralytics AI Library Compromise Leads to Trojanized Versions in Supply Chain Attack

    By mustafa efeOcak 22, 2025Yorum yapılmamış2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The popular Ultralytics YOLO package, widely used for creating custom machine learning models, has been compromised through a supply chain attack on PyPI, the official Python package index. The attackers managed to infiltrate the build environment of the library, deploying cryptocurrency mining malware on systems that installed the compromised package. While the malware in this case was used for mining, the attackers could have easily delivered other types of harmful software.

    According to research from ReversingLabs, the attackers took advantage of a known exploit in GitHub Actions, which allowed them to introduce malicious code during the automated build process. This method bypassed the standard code review mechanisms, ensuring that the malicious code was present in the version of the package uploaded to PyPI, but not in the original code repository on GitHub. This highlighted a significant vulnerability in the way automated build systems can be exploited to introduce threats.

    The trojanized version of the Ultralytics YOLO package, identified as version 8.3.41, was published on December 4. Ultralytics’ developers were alerted to the issue the following day, and they quickly worked to release a new version (8.3.42) to resolve the problem. However, due to a lack of understanding about the source of the breach, the new version inadvertently included the same rogue code. It wasn’t until later on December 5 that a clean version (8.3.43) was published, which addressed the security issue and removed the malware.

    Ultralytics YOLO is a widely-used project with over 30,000 stars and more than 6,000 forks on GitHub. The PyPI package has been downloaded nearly 60 million times, amplifying the impact of this attack. The breach stands out for its sophistication, as it exploited a known GitHub Actions Script Injection vulnerability. This differs from previous incidents, such as the @solana/web3.js npm package compromise, where the attacker gained access through a maintainer’s account. In this case, however, the attackers were able to infiltrate the build environment itself, circumventing traditional security measures and demonstrating the evolving nature of supply chain threats.

    Post Views: 234
    Data Management Programming Languages Software Development
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    mustafa efe
    • Website

    Related Posts

    Anthropic’s Claude Security Tool Analyzes Codebases to Detect Vulnerabilities and Prioritize Fixes

    Mayıs 1, 2026

    Microsoft’s Windows Insider Program Finally Becomes More Streamlined and User-Friendly

    Nisan 11, 2026

    Microsoft launches tool to gather user feedback on Windows issues

    Nisan 8, 2026
    Add A Comment

    Comments are closed.

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    Ocak 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    Ocak 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    Ocak 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By sevketayaksiz
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By sevketayaksiz
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By sevketayaksiz
    Advertisement
    Demo
    Şevket Ayaksız
    Facebook X (Twitter) Instagram YouTube
    • Home
    • Adobe
    • microsoft
    • java
    • Oracle
    • Contact
    © 2026 Theme Designed by Şevket Ayaksız.

    Type above and press Enter to search. Press Esc to cancel.