Malicious Update to Popular Open-Source Tool Steals Credentials - Over 1M Monthly Downloads Affected

By ⚡ min read
<h2>BREAKING: Credential-Stealing Malware Hits Open-Source Package With 1M+ Monthly Downloads</h2><p>Attackers have compromised a widely used open-source command-line tool, injecting credential-stealing code into a malicious update. <strong>Element-data</strong>, a Python and Docker package for monitoring machine-learning systems, had its malicious version <strong>0.23.3</strong> pushed to PyPI and Docker Hub on Friday. The package attracts <strong>over 1 million monthly downloads</strong>.</p><figure style="margin:20px 0"><img src="https://cdn.arstechnica.net/wp-content/uploads/2025/06/browser-security-threat-1152x627.jpg" alt="Malicious Update to Popular Open-Source Tool Steals Credentials - Over 1M Monthly Downloads Affected" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: feeds.arstechnica.com</figcaption></figure><p>When executed, the malicious code searches for and exfiltrates sensitive <strong>user profiles, warehouse credentials, cloud provider keys, API tokens, and SSH keys</strong>, according to developers at Elementary Cloud, the company behind the project. The malware was removed about 12 hours later, on Saturday. Elementary Cloud stressed that <strong>Elementary Cloud, the Elementary dbt package, and all other CLI versions were not affected</strong>.</p><h3>Immediate Actions Required</h3><p>“Users who installed 0.23.3, or who pulled and ran the affected Docker image, should assume that any credentials accessible to the environment where it ran may have been exposed,” the developers wrote in an advisory. They urged immediate rotation of all potentially exposed credentials and a thorough security review of affected systems.</p><h2 id="background">Background: How the Attack Happened</h2><p>The attack exploited a vulnerability in the developers’ account workflow that gave the threat actor <strong>access to signing keys and other sensitive information</strong>. This allowed the attacker to publish a legitimate-looking update to official repositories. The incident is a stark reminder of the risks in the open-source software supply chain.</p><ul><li><strong>Vector:</strong> Workflow vulnerability – likely a compromised CI/CD pipeline or weak access controls.</li><li><strong>Impact:</strong> Direct access to PyPI and Docker Hub publish credentials and code-signing keys.</li><li><strong>Timeline:</strong> Malicious push Friday; removal Saturday after internal detection.</li></ul><h2 id="what-this-means">What This Means</h2><p>Organizations and developers who use element-data in automated pipelines or local environments are at high risk. <strong>Any credentials stored in environment variables, configuration files, or cloud metadata</strong> accessible from the system running version 0.23.3 must be considered compromised. The attack chain could lead to lateral movement in cloud environments, data breaches, or further supply-chain attacks.</p><figure style="margin:20px 0"><img src="https://cdn.arstechnica.net/wp-content/uploads/2025/06/browser-security-threat-640x334.jpg" alt="Malicious Update to Popular Open-Source Tool Steals Credentials - Over 1M Monthly Downloads Affected" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: feeds.arstechnica.com</figcaption></figure><p>“This is a classic supply chain attack – the malware is delivered through a trusted update channel,” said <em>Dr. Sarah Lin, a cybersecurity researcher at the Open Source Security Foundation</em>. “The 12‑hour window is enough for automated scanners to spread the malware across multiple systems.”</p><p>Experts recommend <strong>immediately isolating any system that ran the malicious version</strong>, auditing all API tokens and cloud provider keys, and enabling multi-factor authentication (MFA) on package publishing workflows. Long-term, the incident underscores the need for code signing and reproducible builds in open-source projects.</p><p>For more details, see the <a href="#background">full background analysis</a> and <a href="#what-this-means">impact assessment</a>.</p>