Ultralytics YOLO11 AI Model Compromised by Supply Chain Attack
Ultralytics AI model hijacked to infect thousands with cryptominer 🔗
The Ultralytics YOLO11 AI model has been compromised due to a supply chain attack, leading to the deployment of cryptominers on devices using the affected versions (8.3.41 and 8.3.42) from the Python Package Index (PyPI). This incident has raised concerns as users of these versions were flagged for abusive activity, particularly on Google Colab. The founder of Ultralytics, Glenn Jocher, confirmed the issue and stated that both compromised versions have been removed and replaced with a clean update (8.3.43). An investigation is ongoing to identify the root cause of the breach, which is believed to stem from malicious code injections submitted by a user. Users are advised to perform system scans if they installed the affected versions.
What versions of the Ultralytics model were compromised?
The compromised versions are 8.3.41 and 8.3.42.
What should users do if they downloaded the compromised version?
Users are advised to perform a full system scan to check for any malicious activity.
How did the compromise occur?
The compromise appears to have originated from two malicious pull requests containing code injections submitted by a user in Hong Kong.