Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Phoenix PhaaS Fuels Brand Smishing in Finance Platform Drives
April 30, 2026
Targeted Large-Scale Campaign Attacking U.S. Organizations with
April 30, 2026
Home/CyberSecurity News/Popular Python Package ‘lightning’ Hacked in Supply Chain
CyberSecurity News

Popular Python Package ‘lightning’ Hacked in Supply Chain

A supply chain attack has targeted the popular PyTorch Lightning framework, resulting in the automatic execution of credential-stealing malware when imported. The incident also led to the compromise...

David kimber
David kimber
April 30, 2026 3 Min Read
0 0

A supply chain attack has targeted the popular PyTorch Lightning framework, resulting in the automatic execution of credential-stealing malware when imported. The incident also led to the compromise of GitHub maintainer accounts.

Table Of Content

  • Hidden Malware Execution Chain
  • GitHub Maintainer Account Appears Compromised
  • Mitigations

The popular PyPI package lightning — the deep learning framework used to train, deploy, and ship AI products has been compromised in an active supply chain attack.

Socket’s Research Team flagged versions 2.6.2 and 2.6.3 as malicious just 18 minutes after publication on April 30, 2026. Version 2.6.1, released on January 30, 2026, remains clean and is considered the last safe baseline.

With hundreds of thousands of daily downloads and millions of monthly installations on PyPI, lightning is a cornerstone of Python-based AI and machine learning workflows.

Package compromised

The attack directly targets developer machines, CI/CD pipelines, and cloud build environments. Any system that has installed and imported the compromised versions is considered at risk.

Hidden Malware Execution Chain

Socket’s analysis revealed a hidden _runtime directory embedded inside the malicious packages containing a multi-stage execution chain that activates automatically when the module is imported, requiring no additional user interaction. The components identified include:

  • start.py — Downloads and executes Bun, a JavaScript runtime, directly from GitHub
  • router_runtime.js — An 11 MB heavily obfuscated JavaScript payload containing 703 references to process and env, over 463 references to tokens and authentication material, and 336 references to repositories
  • Daemon thread execution — The malware runs silently with suppressed output, making detection extremely difficult
  • Credential exfiltration — Targets GitHub tokens, NPM tokens, cloud credentials (AWS, GCP, Azure), environment variables, and other secrets
  • GitHub API abuse — Uses stolen tokens to commit encoded data to attacker-controlled repositories
  • NPM package infection — Capable of poisoning developer NPM package tarballs to extend persistence

The obfuscated router_runtime.js payload shares significant technical overlap with the Shai-Hulud attack campaign, including identical credential targeting patterns, token theft logic, and obfuscation techniques.

This is consistent with Team PCP’s escalating open-source supply chain campaign, which previously compromised LiteLLM (March 24, 2026), Telnyx (March 27, 2026), and Xinference in rapid succession.

During the incident response window, an attacker posted a Tor onion link in the Lightning-AI GitHub issue thread pointing to a Team PCP-branded site with a PGP-signed message claiming involvement of LAPSUS$ as “a good partner” throughout the operation.

Socket has not independently verified this attribution and is investigating whether the Team PCP branding reflects true attribution, opportunistic association, or a deliberate false-flag.

GitHub Maintainer Account Appears Compromised

Community member reports surfaced in Lightning-AI’s GitHub repository under issue #21689, titled “Possible supply chain attack on version 2.6.3.”

When Socket subsequently filed a follow-up warning in the pytorch-lightning repository, the issue was closed within one minute by the pl-ghost account, which then posted a “SILENCE DEVELOPER” meme — strongly indicating the project’s GitHub account has been taken over.

Mitigations

Security teams should treat any environment that is installed and imported lightning versions 2.6.2 or 2.6.3 are fully compromised and act immediately:

  1. Remove versions 2.6.2 and 2.6.3 from all affected systems
  2. Downgrade to version 2.6.1 or await official confirmation from maintainers
  3. Rotate all credentials — GitHub tokens, NPM tokens, cloud access keys (AWS, GCP, Azure), and any secrets stored in environment variables
  4. Audit GitHub repositories for unauthorized commits or suspicious encoded data
  5. Review CI/CD pipeline logs, developer workstations, and build systems where the package may have been imported

Socket is continuing its technical analysis and will publish a deeper investigation, including confirmed indicators of compromise (IOCs) and attribution findings, as the incident develops.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurity

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

FBI & CISA Release Zero Trust Guide for Released Principles

Next Post

Targeted Large-Scale Campaign Attacking U.S. Organizations with

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Jenkins Fixes High-Severity Plugin Flaws: Patches Including
April 30, 2026
WordPress Plugin Hacked Since 2020 to Inject Malicious
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us