A major software supply chain attack has shaken the developer community after the widely used Python package elementary-data was compromised on the PyPI, putting thousands of users at risk of credential theft. The malicious version, identified as 0.23.3, was briefly distributed to users and even extended to Docker images hosted on the GitHub Container Registry, amplifying the potential impact.

What makes this attack particularly alarming is the method used to carry it out. According to researchers at StepSecurity, the attackers did not rely on stolen credentials or direct access to the codebase. Instead, they exploited a vulnerability in the project’s GitHub Actions workflow. By posting a malicious script within a pull request comment, they tricked the automated system into executing the code, effectively turning the project’s own CI/CD pipeline against itself.

Using the workflow’s access token, the attackers were able to forge a legitimate release and publish the compromised package without raising immediate suspicion. Once installed, the malicious version dropped a file named “elementary.pth” into the environment. Because Python automatically executes .pth files during startup, the payload activated instantly, giving attackers immediate access to sensitive information on the infected system.

The malware itself is designed as a multi-stage information stealer, carefully targeting valuable developer assets. It scans for cloud credentials, SSH keys, environment configuration files, and even cryptocurrency wallets. Once collected, the data is compressed and silently transmitted to a remote server controlled by the attackers, allowing them to harvest critical secrets without detection.

The scale of the attack is particularly concerning given the package’s popularity, with over one million monthly downloads. Developers who unknowingly installed version 0.23.3 or used the affected Docker image may have exposed sensitive infrastructure credentials, potentially leading to broader compromises across cloud environments and applications.

Fortunately, the issue was identified quickly by community contributors, allowing maintainers to act swiftly. The compromised version was removed and replaced with a clean release, version 0.23.4. However, experts warn that simply updating the package is not enough. Any developer who installed the malicious version must immediately rotate all credentials, including API keys, cloud tokens, and database passwords, to prevent further misuse.

This incident highlights the growing risks within open-source ecosystems, where even trusted packages can become attack vectors. As supply chain attacks continue to rise, developers are being urged to adopt stricter security practices, including dependency pinning, code verification, and stronger access controls within CI/CD pipelines

Recommended Cyber Technology News:

To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com  



🔒 Login or Register to continue reading