Versions 2.6.2 and 2.6.3 of the popular PyTorch Lightning (`lightning`) Python package on PyPI have been compromised as part of the Mini Shai-Hulud supply chain campaign. The malicious code is injected into `__init__.py`, spawning a background thread that downloads the Bun JavaScript runtime and executes an 11 MB payload. The malware silently exfiltrates SSH keys, shell histories, `.env` files, cloud credentials (AWS/GCP/Azure), Kubernetes configs, Docker credentials, cryptocurrency wallets, VPN credentials, and more — all RSA-2048 encrypted and sent to public GitHub repositories. This follows similar attacks on Bitwarden CLI and SAP npm packages by the same actor. Users of these versions should treat their machines as compromised.

3m read timeFrom aikido.dev
Post cover image
Table of contents
How it worksWhat it stealsHow Aikido detects thisIOCs

Sort: