Popular Python AI library hacked to deliver malware

Red padlock open on electric circuits network dark red background
(Image credit: Shutterstock/Chor muang)

  • A PyPI package for an AI model was compromised and used to deliver malware
  • Victims were getting XMRig, a popular cryptominer, installed
  • The attack has since been addressed, but users warned to be on their guard

Ultralytics YOLO11, an AI model for computer vision and object detection, was compromised in an apparent supply chain attack, and used to deploy malware on victim devices.

The attack was confirmed by the company’s founder, who also said the incident was remedied, and the malicious version pulled - however, it seems that new malicious versions have popped up again.

YOLO11 (short for You Only Look Once), is an AI model designed for real-time computer vision tasks, such as identifying objects, analyzing images, and detecting poses. The service is quite popular, being starred more than 30,000 times, forked on GitHub more than 6,000 times, and counts hundreds of thousands of downloads a day.

Newer attacks

As an open source solution, YOLO11 was also available for download on PyPI, one of the world’s biggest Python package repositories.

There, an unidentified threat actor recently broke into the account and uploaded two versions - 8.3.41, and 8.3.42. Those who updated to these versions, either directly or through a dependency, ended up with a cryptocurrency miner on their devices.

The miner installed is called XMRig, and it is by far the most popular cryptojacker (a “hijacker” malware that mines crypto) out there. XMRig is known for generating Monero (XMR), a privacy-oriented currency that is difficult to trace.

Ultralytics founder and CEO Glenn Jocher confirmed the attack, and said it was addressed: "We confirm that Ultralytics versions 8.3.41 and 8.3.42 were compromised by a malicious code injection targeting cryptocurrency mining. Both versions have been immediately removed from PyPI," Jocher posted to GitHub. "We have released 8.3.43 which addresses this security issue. Our team is conducting a full security audit and implementing additional safeguards to prevent similar incidents."

However, over the weekend BleepingComputer said there were user reports of even newer versions - 8.3.45, and 8.3.46, who were “trojanized”. At press time, GitHub shows 8.3.48 as the newest version.

Via BleepingComputer

You might also like

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Huge cybercrime attack sees 390,000 WordPress websites hit, details stolen
The Python banner logo on a computer screen running a code editor.
More malicious Python packages are on the loose, experts warn
A white padlock on a dark digital background.
Developers targeted by malicious Microsoft VSCode extensions
Representational image of a cybercriminal
Criminals are spreading malware disguised as DeepSeek AI
botnet
YouTubers targeted by blackmail campaign to promote malware on their channels
GitHub Webpage
A cracked malicious version of a Go package lay undetected online for years
Latest in Security
China
Chinese hackers targeting Juniper Networks routers, so patch now
Google Chrome dark mode
Google updates Chrome extension rules to ban affiliate link injection without user action or benefit
Abstract image of robots working in an office environment including creating blueprint of robot arm, making a phone call, and typing on a keyboard
This worrying botnet targets unsecure TP-Link routers - thousands of devices already hacked
Avast cybersecurity
UK cybersecurity sector could be worth £13bn, research shows
An option to add Ambient Music buttons to the iOS 18.4 Control Center.
Apple fixes dangerous zero-day used in attacks against iPhones and iPads
Trump
Hackers are abusing $TRUMP tokens to lure victims in to new phishing scam
Latest in News
GTA 5
GTA Online publisher Take-Two is gunning for a black market that’s basically heaven for cheaters
The Discovery+ homepage
Discovery+ just got a big update to its streaming app that makes it more like Max – here are 5 great new features to try
Two Android phones on a green and blue background showing Google Messages
Struggling with slow Google Messages photo transfers? Google says new update will make 'noticeable difference'
China
Chinese hackers targeting Juniper Networks routers, so patch now
Google Meet create custom backgrounds
More AI features are coming to Google Workspace
Elayne, Egwene, and Nynaeve dressed regally and on horseback in The Wheel of Time season 3
'There's a reason why we do it': The Wheel of Time showrunner responds to fans who are still upset over the Prime Video show's plot alterations