Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
Home/CyberSecurity News/PyPI Package Hacked: Malicious Script Popular With
CyberSecurity News

PyPI Package Hacked: Malicious Script Popular With

The popular Python package elementary-data has fallen victim to a major software supply chain attack, leaving thousands of developers vulnerable to massive credential theft. Threat actors...

Emy Elsamnoudy
Emy Elsamnoudy
April 28, 2026 3 Min Read
0 0

The popular Python package elementary-data has fallen victim to a major software supply chain attack, leaving thousands of developers vulnerable to massive credential theft.

Threat actors successfully pushed a malicious version, 0.23.3, to the Python Package Index (PyPI) and poisoned the matching Docker images on the GitHub Container Registry (GHCR).

With over one million monthly downloads, this widely used dbt data observability tool represents a highly lucrative target for cybercriminals.

As detailed by StepSecurity researchers, the attack did not rely on stolen developer passwords.

the original community report(source : stepsecurity )
the original community report (source : stepsecurity )

Instead, hackers exploited a script-injection vulnerability in the project’s GitHub Actions pipeline.

Information Stealer Payload

A newly created GitHub account posted a malicious script in an open pull request comment.

Because the automated workflow failed to process this comment safely, the system executed the code.

Using the workflow’s built-in access token, the attacker forged a verified release commit and triggered the official publishing process without ever touching the main codebase.

The malicious elementary-data 0.23.3 release was listed as the latest on PyPI(source :  stepsecurity)
The malicious elementary-data 0.23.3 release was listed as the latest on PyPI (Source: stepsecurity)

Once installed, the compromised package drops a single malicious file named elementary.pth into the environment.

Since Python automatically runs .pth files whenever the interpreter starts, the malware activates immediately on any machine where the package is installed.

According to threat intelligence reports, the payload is a sophisticated, three-stage information stealer that actively hunts for critical developer secrets and credentials.

It systematically targets and steals:

  • Cloud access tokens for AWS, Google Cloud, and Azure.
  • SSH private keys and Git credentials.
  • Kubernetes service account tokens and Docker configurations.
  • Environment (.env) files containing application secrets.
  • Multiple cryptocurrency wallets, including Bitcoin and Ethereum.

All stolen data is compressed into an archive and silently sent to a remote, attacker-controlled command-and-control server.

The malicious elementary.pth file shipped inside the wheel(source : stepsecurity)
The malicious elementary.pth file shipped inside the wheel(source : stepsecurity)

Affected Versions

To check if you are impacted, StepSecurity advises reviewing your installed builds.

The compromised version of the elementary-data PyPI package is 0.23.3. However, users are safe if they use version 0.23.4 or the earlier 0.23.2.

Similarly, the affected Docker image is ghcr.io/elementary-data/elementary:0.23.3, while version 0.23.4 (or 0.23.2) is clean.

Furthermore, if you are using the latest Docker image tag with a digest ending in 634255, your environment is compromised.

The injected payload running inside the workflow(source : stepsecurity)
The injected payload running inside the workflow (source: stepsecurity)

StepSecurity warns that you must ensure your latest tag is updated to the newly provided clean build.

Thanks to the quick action of community members Crisperik and H-Max, who spotted the malicious code, the maintainers were alerted within hours.

The Elementary team immediately removed the dangerous 0.23.3 version from PyPI and GHCR, releasing a clean 0.23.4 replacement the same day.

Developers who were exposed to the malicious update must fully rotate all credentials, API keys, and database passwords on the affected machines.

Enable two-factor authentication on all vital infrastructure and pin future package dependencies to specific, verified versions to stop automatic malicious updates.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerMalwareSecurityThreatVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Linux ELF Malware Evades ML Detection via Semantic

Next Post

Sandworm SSH-over-Tor Tunnel for Hidden Persistence

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us