Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    What is optical interconnect and why Lightelligence’s $10B debut says it matters for AI

    April 28, 2026

    GPT 5.5 vs Opus 4.7: Which is the Best AI Model Today?

    April 28, 2026

    Open source package with 1 million monthly downloads stole user credentials

    April 28, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Open source package with 1 million monthly downloads stole user credentials
    Open source package with 1 million monthly downloads stole user credentials
    Tech Reviews

    Open source package with 1 million monthly downloads stole user credentials

    gvfx00@gmail.comBy gvfx00@gmail.comApril 28, 2026No Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    The developers are urging all developers who installed version 0.23.3 to take the following steps immediately:

    1. Check your installed version:

    pip show elementary-data | grep Version

    2. If the version is 0.23.3, uninstall it and replace it with the safe version:

    pip uninstall elementary-data

    pip install elementary-data==0.23.4

    In your requirements and lockfiles, pin explicitly to elementary-data==0.23.4.

    3. Delete your cache files to avoid any artifacts.

    4. Check for the malware’s marker file on any machine where the CLI may have run: If this file is present, the payload executed on that machine.

    macOS / Linux: /tmp/.trinny-security-update

    Windows: %TEMP%\\.trinny-security-update

    5. Rotate any credentials that were accessible from the environment where 0.23.3 ran – dbt profiles, warehouse credentials, cloud provider keys, API tokens, SSH keys, and the contents of any .env files. CI/CD runners are especially exposed because they typically have broad sets of secrets mounted at runtime.

    6. Contact your security team to hunt for unauthorized usage of exposed credentials. The relevant IOCs are at the bottom of this post.

    Over the past decade, supply-chain attacks on open source repositories have become increasingly common. In some cases, they have achieved a chain of compromises as the malicious package leads to breaches of users and, from there, breaches resulting from the compromise of the users’ environments.

    HD Moore, a hacker with more than four decades of experience and the founder and CEO of runZero, said that user-developed repository workflows, such as GitHub actions, are notorious for hosting vulnerabilities.

    It’s a “a major problem for open source projects with open repos,” he said. “It’s really hard to not accidentally create dangerous workflows that can be exploited by an attacker’s pull request.”

    He said this package can be used to check for such vulnerabilities.

    Table of Contents

    Toggle
      • Related posts:
    • 15 years after 'Video Games,' Lana Del Rey has an actual video game song
    • Your Old Fridge Is Costing You. Here's How Much Energy a New Model Saves Each Year
    • Report reveals that OpenAI's GPT-5.2 model cites Grokipedia

    Related posts:

    Steam store pages get a mini makeover to better suit wide screens

    Why iRobot’s founder won’t go within 10 feet of today’s walking robots

    Automated Frequency Coordination (AFC), Explained: Understanding Wi-Fi 7's Cool Range-Extending Feat...

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article‘Pizza Tower’, ‘Castlevania Dominus Collection’, Plus Today’s Other Releases and Sales – TouchArcade
    Next Article GPT 5.5 vs Opus 4.7: Which is the Best AI Model Today?
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    Images of Samsung’s rumored smart glasses have leaked

    April 28, 2026
    Tech Reviews

    Spotify Enters Its Fitness Era With New Peloton and Influencer Partnership

    April 27, 2026
    Tech Reviews

    James Gunn cautiously reveals that 2 beleaguered DC comic book shows are still ‘in development’ — but the DCU’s biggest movie gamble has been shelved

    April 27, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025139 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202526 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202518 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025139 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202526 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202518 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.