T1195.001Compromise Software Dependencies and Development Tools
99%
“, microsoft defender detected and blocked the threat on affected endpoints, limiting its spread to a relatively small number of systems. it is still unclear how attackers managed to insert the backdoor. lightning ai continues to examine whether a compromised developer account, bu…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
98%
“malicious pytorch lightning update hits ai supply chain security a malicious pytorch lightning update ( v2. 6. 3 ) on pypi spread briefly, stealing credentials and raising major concerns about ai supply chain security. a malicious update of the pytorch lightning library exposed d…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.002Compromise Software Supply Chain
64%
“malicious pytorch lightning update hits ai supply chain security a malicious pytorch lightning update ( v2. 6. 3 ) on pypi spread briefly, stealing credentials and raising major concerns about ai supply chain security. a malicious update of the pytorch lightning library exposed d…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
49%
“systems. “ lightning = = 2. 6. 3 ( published on pypi as py3 - none - any wheel ) contains a hidden execution chain that silently downloads a javascript runtime ( bun ) and executes an 11. 4 mb heavily obfuscated javascript payload upon import lightning. this payload contains cred…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.002Compromise Software Supply Chain
36%
“systems. “ lightning = = 2. 6. 3 ( published on pypi as py3 - none - any wheel ) contains a hidden execution chain that silently downloads a javascript runtime ( bun ) and executes an 11. 4 mb heavily obfuscated javascript payload upon import lightning. this payload contains cred…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1587Develop Capabilities
35%
“malicious pytorch lightning update hits ai supply chain security a malicious pytorch lightning update ( v2. 6. 3 ) on pypi spread briefly, stealing credentials and raising major concerns about ai supply chain security. a malicious update of the pytorch lightning library exposed d…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
34%
“systems. “ lightning = = 2. 6. 3 ( published on pypi as py3 - none - any wheel ) contains a hidden execution chain that silently downloads a javascript runtime ( bun ) and executes an 11. 4 mb heavily obfuscated javascript payload upon import lightning. this payload contains cred…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
A malicious PyTorch Lightning update (v2.6.3) on PyPI spread briefly, stealing credentials and raising major concerns about AI supply chain security. A malicious update of the PyTorch Lightning library exposed developers to credential theft and remote compromise. Attackers uploaded version 2.6.3 to the Python Package Index (PyPI), where it spread among developers before maintainers removed […]