Web Analytics
Cryptopolitan
2026-05-13 01:18:38

Mistral AI and TanStack hit in supply chain attack with SLSA-attested malware

Attackers compromised the official Mistral AI Python package on PyPI along with hundreds of other widely-used developer packages, exposing GitHub tokens, cloud credentials, and password vaults across the AI and crypto developer ecosystem. Microsoft Threat Intelligence said on May 11, it was investigating the mistralai PyPI package version 2.4.6 after discovering malicious code injected in mistralai/client/__init__.py that executed on import, downloading a secondary payload from 83.142.209.194 to /tmp/transformers.pyz and launching it on Linux systems. Microsoft is investigating mistralai PyPI package v2.4.6 compromise. Attackers injected code in mistralai/client/__init__.py that executes on import, downloads hxxps://83[.]142[.]209[.]194/transformers.pyz to /tmp/transformers.pyz, and launches a second-stage payload on Linux.… pic.twitter.com/9Xfb07Hcia — Microsoft Threat Intelligence (@MsftSecIntel) May 12, 2026 The filename impersonates Hugging Face’s widely used Transformers AI framework. The Mistral compromise is one piece of a coordinated campaign researchers are calling Mini Shai-Hulud. Security platform SafeDep reported that the operation compromised over 170 packages and published 404 malicious versions between May 11 and 12. The attack carries CVE-2026-45321 with a CVSS score of 9.6, rating it critical severity. The SLSA provenance trust model just broke What makes this attack structurally unprecedented: the malicious packages carried valid SLSA Build Level 3 provenance attestations. SLSA provenance is a cryptographic certificate generated by Sigstore meant to verify that a package was built from a trusted source. Snyk reported the TanStack attack is the first documented case of malicious npm packages with valid SLSA provenance, meaning attestation-based supply chain defenses are now demonstrably insufficient. The attackers, identified as TeamPCP, chained three vulnerabilities: a pull_request_target workflow misconfiguration, GitHub Actions cache poisoning, and runtime memory extraction of an OIDC token from the GitHub Actions runner process. The malicious commit was authored under a fabricated identity impersonating the Anthropic Claude GitHub App, prefixed with [skip ci] to suppress automated checks. What the malware steals and how it spreads As Cryptopolitan reported on the January 2026 Trust Wallet incident tied to $8.5 million in losses, the Shai-Hulud worm has been evolving across multiple waves since September 2025. This latest variant adds password vault theft, with Wiz researchers documenting that the malware now targets 1Password and Bitwarden vaults alongside SSH keys, AWS and GCP credentials, Kubernetes service accounts, GitHub tokens, and npm publishing credentials. The stealer exfiltrates via three redundant channels: a typosquat domain (git-tanstack.com), the decentralized Session messenger network, and Dune-themed GitHub repositories created with stolen tokens. The malware exits if Russian language settings are detected. On systems geolocated to Israel or Iran, it introduces a 1-in-6 probability of executing recursive wipe ( rm -rf / ). How Mistral and the broader ecosystem responded Mistral published a security advisory on May 12 saying its core infrastructure was not compromised. The company traced the incident to a compromised developer device tied to the broader TanStack supply-chain campaign. The mistralai==2.4.6 release was uploaded shortly after midnight UTC on May 12, before PyPI quarantined the project. Compromised npm packages, including @mistralai/mistralai, @mistralai/mistralai-azure, and @mistralai/mistralai-gcp , were available for several hours before removal. The cumulative weekly download volume of the compromised packages exceeds 518 million. @tanstack/react-router alone receives 12.7 million weekly downloads. Developers who installed affected versions are advised to rotate cloud credentials, GitHub tokens, SSH keys, and exchange API keys, and inspect .claude/ and .vscode/ directories for persistence hooks. The smartest crypto minds already read our newsletter. Want in? Join them .

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.