Navigation
Recherche
|
Supply chain compromise of Ultralytics AI library results in trojanized versions
lundi 9 décembre 2024, 15:14 , par InfoWorld
Attackers have compromised Ultralytics YOLO packages published on PyPI, the official Python package index, by compromising the build environment of the popular library for creating custom machine learning models. The malicious code deployed cryptocurrency mining malware on systems that installed the package, but the attackers could have delivered any type of malware.
According to researchers from ReversingLabs, the attackers leveraged a known exploit via GitHub Actions to introduce malicious code during the automated build process, therefore bypassing the usual code review process. As a result, the code was present only in the package pushed to PyPI and not in the code repository on GitHub. Continue reading on CSOonline.com.
https://www.csoonline.com/article/3619159/supply-chain-compromise-of-ultralytics-ai-library-results-...
Voir aussi |
56 sources (32 en français)
Date Actuelle
jeu. 12 déc. - 07:37 CET
|