Supply Chain Attack on Popular ML Tool Exposes User Credentials

A widely used open-source package for monitoring machine learning systems was recently compromised in a sophisticated supply chain attack. The malicious version, downloaded over 1 million times per month, stole sensitive credentials from users’ systems before being removed.

The Incident: Compromised Package

On Friday, unknown threat actors exploited a vulnerability in the developer account workflow of element-data, a command-line interface (CLI) tool designed to help data scientists monitor performance and anomalies in machine-learning models. The attackers gained access to signing keys and other sensitive information, allowing them to push a malicious update to the package.

Supply Chain Attack on Popular ML Tool Exposes User Credentials
Source: feeds.arstechnica.com

The compromised version, 0.23.3, was published to both the Python Package Index (PyPI) and the official Docker image repository. Once installed and executed, the malicious code scoured the host system for valuable data, including user profiles, warehouse credentials, cloud provider keys, API tokens, and SSH keys. The malicious package remained available for approximately 12 hours before being taken down on Saturday.

What Was Affected

Only users who installed version 0.23.3 or who pulled and ran the affected Docker image were at risk. The developers confirmed that Elementary Cloud, the Elementary dbt package, and all other CLI versions were not compromised. However, the developers warned that anyone who ran the malicious version should assume that any credentials accessible to that environment may have been exposed.

How the Attack Unfolded

The attack exploited a weakness in the developers’ account verification and signing pipeline. Although the exact vulnerability has not been disclosed publicly, the incident underscores a growing trend: threat actors targeting the software supply chain by compromising developer accounts or build infrastructure.

What Was Exposed

The malicious payload was designed to harvest a wide range of sensitive information from the infected environment. According to the developers, the code searched for:

Recommended

Discover More

Precision Breakthrough: Scientists Pin Down Gravity's Elusive Strength with Unprecedented Accuracy10 Incredible Revelations from the Cambrian Fossil Bonanza That Rewrite Early LifeKAME: Sakana AI's Real-Time Hybrid Speech Architecture Bridges Speed and IntelligenceMay Brings 16 New Titles to GeForce NOW, Plus Enhanced RTX 5080 Power for Ultimate MembersHow a $55.5 Billion Takeover Bid Works: A Deep Dive into GameStop's Proposal for eBay