Scan to download
BTC $79,302.49 -1.62%
ETH $2,256.29 -1.11%
BNB $671.98 +1.01%
XRP $1.42 -0.98%
SOL $91.11 -3.62%
TRX $0.3496 +0.11%
DOGE $0.1133 +3.09%
ADA $0.2645 -2.72%
BCH $433.98 -1.36%
LINK $10.19 -1.06%
HYPE $38.90 -3.84%
AAVE $95.96 -1.11%
SUI $1.20 -2.84%
XLM $0.1590 -2.23%
ZEC $525.66 -8.21%
BTC $79,302.49 -1.62%
ETH $2,256.29 -1.11%
BNB $671.98 +1.01%
XRP $1.42 -0.98%
SOL $91.11 -3.62%
TRX $0.3496 +0.11%
DOGE $0.1133 +3.09%
ADA $0.2645 -2.72%
BCH $433.98 -1.36%
LINK $10.19 -1.06%
HYPE $38.90 -3.84%
AAVE $95.96 -1.11%
SUI $1.20 -2.84%
XLM $0.1590 -2.23%
ZEC $525.66 -8.21%

Hackers implanted malicious code in the Mistral AI software package

2026-05-13 08:15:45
Collection

According to Decrypt, Microsoft's threat intelligence department disclosed that attackers implanted malicious code into the Mistral AI package distributed through the PyPI platform. This malicious code automatically runs when developers use it on Linux systems, downloading a malicious file named transformers.pyz and executing it in the background, with the filename deliberately mimicking the widely used Hugging Face Transformers library to confuse users.

Microsoft pointed out that this malware primarily steals developer login credentials and access tokens, and it avoids Russian systems. Some of the code can randomly delete device files located in Israel or Iran. This attack is related to the "Shai-Hulud" supply chain attack campaign that started in September. Mistral responded that investigations show the attack originated from compromised developer devices, and the company's infrastructure was not breached.

app_icon
ChainCatcher Building the Web3 world with innovations.