Table of Contents
  • Home
  • /
  • Blog
  • /
  • Ultralytics YOLO AI Model Compromised by Cryptomining Supply Chain Attack
December 9, 2024
|
3m

Ultralytics YOLO AI Model Compromised by Cryptomining Supply Chain Attack


Blue colored ultralytics logo on light blue colored background.

Cybersecurity researchers have uncovered a significant supply chain attack targeting the popular Ultralytics YOLO AI model, where threat actors compromised two versions of the package to deploy cryptocurrency miners on affected systems. The compromised versions, 8.3.41 and 8.3.42, were distributed through the Python Package Index (PyPI) repository.

The malicious versions were found to contain injected code that automatically installs and executes an XMRig Miner, connecting to a mining pool at "connect.consrensys[.]com:8080" to mine cryptocurrency without users' knowledge or consent. The discovery came to light when several developers reported suspicious system behavior and unexpected Google Colab account bans due to "abusive activity."

"The compromise has potentially affected thousands of users who downloaded these versions through PyPI," said security researchers investigating the incident. "The attack specifically targeted the YOLO11 model, which is widely used in computer vision and artificial intelligence applications."

The impact of this supply chain attack has been particularly severe for projects dependent on the Ultralytics package, including popular frameworks like SwarmUI and ComfyUI. These projects confirmed that fresh installations of their libraries during the compromise period would have inadvertently led to the deployment of the cryptomining malware.

Ultralytics has responded swiftly to the security breach by removing the compromised versions from PyPI and releasing version 8.3.43 as a secure update. The company is currently conducting a comprehensive security audit and implementing additional safeguards to prevent similar incidents in the future.

Initial investigation findings suggest that the compromise originated from malicious pull requests submitted by a user based in Hong Kong. "We are working closely with security researchers to understand the full scope of the attack and implement stronger verification processes for code contributions," an Ultralytics spokesperson stated.

Security experts recommend that users who may have downloaded the compromised versions take immediate action by:

  • Updating to the latest secure version (8.3.43)

  • Performing a full system scan for malware

  • Checking for and blocking any outgoing connections to "connect.consrensys[.]com:8080"

  • Monitoring system resources for unusual CPU usage patterns

The incident highlights the growing trend of supply chain attacks targeting popular development packages and AI models. "Threat actors are increasingly targeting AI and machine learning tools due to their widespread adoption and the computational resources they typically have access to," explained a cybersecurity analyst familiar with the case.

This attack serves as a reminder of the importance of maintaining robust security practices in the AI development ecosystem and the need for constant vigilance in monitoring dependencies for potential compromises.

Users and organizations utilizing the Ultralytics YOLO model in their projects are strongly advised to verify their installed versions and update their security protocols accordingly. Ultralytics has promised to provide regular updates as their investigation continues and more information becomes available about the extent of the compromise.

Found this article interesting? Keep visit thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this. 

You may also like these articles:

Anthony Denis

Anthony Denis a Security News Reporter with a Bachelor's in Business Computer Application. Drawing from a decade of digital media marketing experience and two years of freelance writing, he brings technical expertise to cybersecurity journalism. His background in IT, content creation, and social media management enables him to deliver complex security topics with clarity and insight.

Recently added

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe