Get the latest tech news

Analysis of supply-chain attack on Ultralytics


Analysis of a package targeted by a supply-chain attack to the build and release process

From looking at the Sigstore transparency logs and the PyPI provenance attestations, it was clear that the first set of injected packages were published through the existing GitHub Actions workflow, not by an API token. The second round of malicious releases came from the attacker using an unrevoked PyPI API token that was still available to the GitHub Actions workflow, potentially a hold-over from before the project adopted Trusted Publishing. This prevents attacks similar to xz-utils backdoor, where the malicious code was hidden in a binary archive file and therefore not easily reviewable by humans or tooling.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of analysis

analysis

Photo of chain attack

chain attack

Photo of Ultralytics

Ultralytics

Related news:

News photo

Yearlong Supply-Chain Attack Targeting Security Pros Steals 390,000 Credentials

News photo

Yearlong supply-chain attack targeting security pros steals 390K credentials

News photo

Zizmor would have caught the Ultralytics workflow vulnerability