Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Ultralytics compromise

Type
Incident
Actors
❓Unknown
Pub. date
December 5, 2024
Initial access
Cloud native misconfig
Impact
Supply chain attackResource hijacking
Observed techniques
Cloud compute cryptojackingSupply Chain CompromiseScript injection into CICD workflow
Targeted technologies
GitHub
References
https://www.wiz.io/blog/ultralytics-ai-library-hacked-via-github-for-cryptomining
Status
Finalized
Last edited
Jan 13, 2025 11:47 AM

Ultralytics is a popular AI image prediction library with over 33k stars on GitHub and a dependency for many packages. On December 5, 2024 security researchers have identified a supply chain attack targeting deployment versions of the Ultralytics Python package. The compromised versions, 8.3.41 and 8.3.42, contain malicious code that executes unauthorized cryptocurrency mining software (XMRig) on affected machines.  This compromise was limited to the PyPI-hosted versions of the package, and local or earlier versions remain unaffected.

The attacker manipulated GitHub Actions by exploiting branch names in pull requests to execute arbitrary code, bundling a cryptominer into the package. A subsequent “mitigation” release of Ultralytics was also compromised, escalating the risk for users who might have updated to the new version and assumed they were secure.

Made with 💙 by Wiz

Last Updated: April 3, 2025