Supply Chain Attack on Popular ML Tool Exposes User Credentials

By

A widely used open-source package for monitoring machine learning systems was recently compromised in a sophisticated supply chain attack. The malicious version, downloaded over 1 million times per month, stole sensitive credentials from users’ systems before being removed.

The Incident: Compromised Package

On Friday, unknown threat actors exploited a vulnerability in the developer account workflow of element-data, a command-line interface (CLI) tool designed to help data scientists monitor performance and anomalies in machine-learning models. The attackers gained access to signing keys and other sensitive information, allowing them to push a malicious update to the package.

Supply Chain Attack on Popular ML Tool Exposes User Credentials
Source: feeds.arstechnica.com

The compromised version, 0.23.3, was published to both the Python Package Index (PyPI) and the official Docker image repository. Once installed and executed, the malicious code scoured the host system for valuable data, including user profiles, warehouse credentials, cloud provider keys, API tokens, and SSH keys. The malicious package remained available for approximately 12 hours before being taken down on Saturday.

What Was Affected

Only users who installed version 0.23.3 or who pulled and ran the affected Docker image were at risk. The developers confirmed that Elementary Cloud, the Elementary dbt package, and all other CLI versions were not compromised. However, the developers warned that anyone who ran the malicious version should assume that any credentials accessible to that environment may have been exposed.

How the Attack Unfolded

The attack exploited a weakness in the developers’ account verification and signing pipeline. Although the exact vulnerability has not been disclosed publicly, the incident underscores a growing trend: threat actors targeting the software supply chain by compromising developer accounts or build infrastructure.

What Was Exposed

The malicious payload was designed to harvest a wide range of sensitive information from the infected environment. According to the developers, the code searched for:

Tags:

Related Articles

Recommended

Discover More

Understanding Ingress-NGINX Quirks: What You Need Before MigrationHow to Demand Real FISA 702 Reforms: A Citizen's Action GuideCapcom’s PRAGMATA Launches Directly on GeForce NOW: Stream Day One Without HardwareCloudflare Unleashes Autonomous AI Agents to Deploy Apps with Zero Human InterventionThe AI Cyber Threat Landscape in Early 2026: Maturation, Stealth, and New Frontiers