Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Agentic AI: How to Save on Tokens
    • Lightweight ebike conversion kit electrifies your bike
    • Taylor Swift Wants to Trademark Her Likeness. These TikTok Deepfake Ads Show Why
    • New Releases on Prime Video in May 2026: Jack Reacher, Spider-Noir and More
    • 4 YAML Files Instead of PySpark: How We Let Analysts Build Data Pipelines Without Engineers
    • Metajets use light propulsion for future space travel
    • Malta’s startup residency: A pathway for founders expanding into Europe (Sponsored)
    • Sanctioned Chinese AI Firm SenseTime Releases Image Model Built for Speed
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Wednesday, April 29
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Open source package with 1 million monthly downloads stole user credentials
    News

    Open source package with 1 million monthly downloads stole user credentials

    Editor Times FeaturedBy Editor Times FeaturedApril 28, 2026No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    The builders are urging all builders who put in model 0.23.3 to take the next steps instantly:

    1. Examine your put in model:

    pip present elementary-data | grep Model

    2. If the model is 0.23.3, uninstall it and substitute it with the protected model:

    pip uninstall elementary-data

    pip set up elementary-data==0.23.4

    In your necessities and lockfiles, pin explicitly to elementary-data==0.23.4.

    3. Delete your cache recordsdata to keep away from any artifacts.

    4. Examine for the malware’s marker file on any machine the place the CLI might have run: If this file is current, the payload executed on that machine.

    macOS / Linux: /tmp/.trinny-security-update

    Home windows: %TEMP%.trinny-security-update

    5. Rotate any credentials that had been accessible from the setting the place 0.23.3 ran – dbt profiles, warehouse credentials, cloud supplier keys, API tokens, SSH keys, and the contents of any .env recordsdata. CI/CD runners are particularly uncovered as a result of they sometimes have broad units of secrets and techniques mounted at runtime.

    6. Contact your safety crew to hunt for unauthorized utilization of uncovered credentials. The related IOCs are at the bottom of this post.

    Over the previous decade, supply-chain assaults on open supply repositories have grow to be more and more widespread. In some circumstances, they’ve achieved a series of compromises because the malicious package deal results in breaches of customers and, from there, breaches ensuing from the compromise of the customers’ environments.

    HD Moore, a hacker with greater than 4 a long time of expertise and the founder and CEO of runZero, stated that user-developed repository workflows, akin to GitHub actions, are infamous for internet hosting vulnerabilities.

    It’s a “a significant downside for open supply tasks with open repos,” he stated. “It’s actually onerous to not by chance create harmful workflows that may be exploited by an attacker’s pull request.”

    He stated this package can be utilized to test for such vulnerabilities.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Why a recent supply-chain attack singled out security firms Checkmarx and Bitwarden

    April 29, 2026

    The European Commission issues preliminary DSA findings against Meta, saying Instagram and Facebook fail to prevent under-13 users from accessing the services (Gian Volpicelli/Bloomberg)

    April 29, 2026

    Alberta online gambling expansion sparks concern among First Nations casino operators

    April 29, 2026

    Better Markets urges courts to let states regulate prediction markets, not CFTC

    April 29, 2026

    Q&A with Sam Altman and AWS CEO Matt Garman about OpenAI’s new partnership with AWS, Bedrock Managed Agents, Trainium chips, and more (Ben Thompson/Stratechery)

    April 28, 2026

    Snapchat launches AI Sponsored Snaps, a conversational ad format in the Chat tab that lets users talk to brand-specific AI agents for product recommendations (Aisha Malik/TechCrunch)

    April 28, 2026
    Leave A Reply Cancel Reply

    Editors Picks

    Agentic AI: How to Save on Tokens

    April 29, 2026

    Lightweight ebike conversion kit electrifies your bike

    April 29, 2026

    Taylor Swift Wants to Trademark Her Likeness. These TikTok Deepfake Ads Show Why

    April 29, 2026

    New Releases on Prime Video in May 2026: Jack Reacher, Spider-Noir and More

    April 29, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    This Jammer Wants to Block Always-Listening AI Wearables. It Probably Won’t Work

    March 7, 2026

    OpenAI unveils ChatGPT Agent for autonomous tasks

    July 18, 2025

    Knaus Boxtime camper van of the future is debuting now

    July 20, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.