Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Supply Chain Attacks Target PyTorch Lightning for Credential Theft

Supply Chain Attacks Target PyTorch Lightning for Credential Theft

Posted on April 30, 2026 By CWS

In a recent software supply chain attack, cybercriminals have infiltrated the widely-used Python package, Lightning, introducing malicious versions to facilitate credential theft. Security firms Aikido Security, OX Security, Socket, and StepSecurity have identified versions 2.6.2 and 2.6.3, released on April 30, 2026, as the compromised versions. These developments are seen as a continuation of the Mini Shai-Hulud campaign, previously targeting SAP-related npm packages.

Details of the PyTorch Lightning Attack

The Python Package Index (PyPI) repository administrators have quarantined the affected project. PyTorch Lightning is an open-source Python framework known for its high-level interface for PyTorch, boasting over 31,100 stars on GitHub. According to Socket, the compromised versions contain a concealed _runtime directory housing a downloader and an obfuscated JavaScript payload. This payload automatically activates upon importing the Lightning module, requiring no further user interaction.

The attack sequence initiates with a Python script (‘start.py’) that downloads and runs the Bun JavaScript runtime. This setup then executes an 11MB obfuscated payload (‘router_runtime.js’), designed to steal credentials extensively. Project maintainers have acknowledged awareness of the issue and are investigating its origins, with initial signs pointing to a possible GitHub account compromise.

Implications and Recommended Actions

The stolen credentials include GitHub tokens, which are verified against the ‘api.github[.]com/user’ endpoint before being used to inject malicious payloads into repositories. These operations create new files or overwrite existing ones without pre-checks, using a hardcoded identity to mimic Anthropic’s Claude Code.

Moreover, the malware exploits an npm-based propagation strategy, modifying local npm packages with a postinstall hook in the ‘package.json’ file. This alteration invokes the malicious payload, updates the version number, and repacks the .tgz tarballs. Developers who unknowingly publish these tampered packages risk spreading the malware across user systems.

Connection to TeamPCP and Further Exploits

As a precaution, developers should block versions 2.6.2 and 2.6.3 of Lightning, remove them if installed, revert to version 2.6.1, and rotate any exposed credentials. This attack is attributed to TeamPCP, a threat actor with a history of similar exploits, now operating a website on the dark web after their account suspension from X.

In a related incident, the intercom-client version 7.0.4 has also been compromised under the Mini Shai-Hulud campaign, using a similar approach as the SAP packages to deploy credential-stealing malware. This connection is notable due to shared technical details, including payload characteristics and credential harvesting methods, linking it to previous attacks involving Checkmarx, Bitwarden, and others.

These incidents underscore the importance of vigilance in software supply chains, highlighting the need for robust security measures and prompt responses to emerging threats.

The Hacker News Tags:credential theft, Cybersecurity, dark web, GitHub, Intercom-client, Malware, Mini Shai-Hulud, NPM, Python packages, PyTorch Lightning, software compromise, supply chain, TeamPCP, Threat Actors

Post navigation

Previous Post: Qilin Ransomware Exploits RDP History for Network Infiltration
Next Post: Phishing Campaign Targets US Firms with Fake Invitations

Related Posts

Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds The Hacker News
AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar The Hacker News
Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers The Hacker News
Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability The Hacker News
Why Organizations Are Turning to RPAM Why Organizations Are Turning to RPAM The Hacker News
Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Propels Cybercrime with Rapid Attack Deployment
  • Zero Trust Guidelines for Protecting Industrial Systems
  • Anthropic Launches Claude Security to Combat AI Exploit Threats
  • Phoenix PhaaS Threatens Global Finance and Telecom Sectors
  • Phishing Campaign Targets US Firms with Fake Invitations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Propels Cybercrime with Rapid Attack Deployment
  • Zero Trust Guidelines for Protecting Industrial Systems
  • Anthropic Launches Claude Security to Combat AI Exploit Threats
  • Phoenix PhaaS Threatens Global Finance and Telecom Sectors
  • Phishing Campaign Targets US Firms with Fake Invitations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark