Mistral AI PyPI Package Compromised by Malicious Code Targeting Developer Credentials

According to Decrypt, attackers planted malicious code in Mistral AI’s software package distributed via PyPI. When developers use the package on Linux systems, the malicious code automatically executes, downloading a file named transformers.pyz from a remote server and running it in the background. The file name mimics the widely-used Hugging Face Transformers library. Microsoft’s threat intelligence team stated the malware primarily steals developer login credentials and access tokens. Mistral confirmed that one developer’s machine was compromised, but the company’s infrastructure remained unaffected.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.
Comment
0/400
No comments