ThreatLocker
  • Home
  • News
  • Security
  • Ultralytics AI model hijacked to infect thousands with cryptominer

Ultralytics AI model hijacked to infect thousands with cryptominer

  • December 6, 2024
  • 01:54 PM
  • 3

Ultralytics

The popular Ultralytics YOLO11 AI model was compromised in a supply chain attack to deploy cryptominers on devices running versions 8.3.41 and 8.3.42 from the Python Package Index (PyPI)  

Ultralytics is a software development company specializing in computer vision and artificial intelligence (AI), specifically in object detection and image processing.

It's best known for its "YOLO" (You Only Look Once) advanced object detection model, which can quickly and accurately detect and identify objects in video streams in real time.

image

Ultralytics tools are open-source and are used by numerous projects spanning a wide range of industries and applications.

The library has been starred 33,600 times and forked 6,500 times on GitHub, and it has had over 260,000 downloads over the past 24 hours from PyPI alone.

Ultralytics YOLO11 compromised

Yesterday, Ultralytics 8.3.41 and 8.3.42 were released to PyPi, and users who installed the compromised versions directly or as a dependency discovered that a cryptominer was deployed. For Google Colab accounts, owners got flagged and banned due to "abusive activity."

Ultralytics is a dependency of both SwarmUI and ComfyUI, who both confirmed that fresh installs of their libraries would have led to the installation of the miner.

SwarmUI
Source: @GozukaraFurkan

When installed, the compromised library installs and launches an XMRig Miner at '/tmp/ultralytics_runner' to connect to a minin pool at "connect.consrensys[.]com:8080".

Running XMRig Miner processes
Running XMRig Miner processes
Source: Floresce

Ultralytics founder and CEO Glenn Jocher confirmed that the issue only impacts those two compromised versions, which have already been pulled and replaced with a clean 8.3.43 version.

"We confirm that Ultralytics versions 8.3.41 and 8.3.42 were compromised by a malicious code injection targeting cryptocurrency mining. Both versions have been immediately removed from PyPI," Jocher posted to GitHub.

"We have released 8.3.43 which addresses this security issue. Our team is conducting a full security audit and implementing additional safeguards to prevent similar incidents."

Comment by Glenn Jocher on GitHub
Comment by Glenn Jocher on GitHub
Source: BleepingComputer


The developers are currently investigating the root cause, and potential vulnerabilities in the Ultralytics build environment to determine how it was breached.

However, Jocher commented that the compromise appears to originate from two malicious PRs [1, 2]with code injection in the branch names submitted by a user in Hong Kong.

Whether the malicious code solely performed crypto mining or compromised private user data remains unclear, and the community is still awaiting a formal advisory regarding the breach that will provide clarifications on all details.

Out of an abundance of caution, those who downloaded a malicious version of Ultralytics should perform a full system scan.

BleepingComputer has contacted Ultralytics to comment on the situation and learn more about how the supply chain compromise was achieved, but we are still awaiting a response.

Update 12/8: There are user reports of new trojanized releases on PyPI, so the attack appears to continue through new package versions 8.3.45 and 8.3.46. 

article image

99% of What Mythos Found Is Still Unpatched.

AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what's exploitable, proves controls hold, and closes the remediation loop.

Claim Your Spot

Related Articles:

Trivy supply-chain attack spreads to Docker, GitHub repos

New Checkmarx supply-chain breach affects KICS analysis tool

New npm supply-chain attack self-spreads to steal auth tokens

CPUID hacked to deliver malware via CPU-Z, HWMonitor downloads

Smart Slider updates hijacked to push malicious WordPress, Joomla versions

Bill Toulas
Bill Toulas is a tech writer and infosec news reporter with over a decade of experience working on various online publications, covering open-source, Linux, malware, data breach incidents, and hacks.

Comments

  • Wannabetech1 Photo
    Wannabetech1 - 1 year ago

    "which can quickly and accurately detect and identify objects in video streams in real time."
    Huh wonder who would have a use for that?

  • kristiana Photo
    kristiana - 1 year ago

    <p>&quot;&quot;which can quickly and accurately detect and identify objects in video streams in real time.&quot; Huh wonder who would have a use for that?&quot; Real-time object detection in video streams is invaluable for various industries. For example, in security and surveillance, it enables rapid identification of suspicious activities or individuals, enhancing response times for law enforcement.</p>

  • Wannabetech1 Photo
    Wannabetech1 - 1 year ago

    I guess my "smartassness" didn't come through. In any case you made my case though I was thinking government surveillance and not retail which just makes it worse.

Post a Comment Community Rules
You need to login in order to post a comment

Not a member yet? Register Now

You may also like:

Login

Reporter

Help us understand the problem. What is going on with this comment?

Read our posting guidelinese to learn what content is prohibited.

SUBMIT