Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Supply Chain Poisoning via PyPI Repository Compromise

0
Medium
Published: Mon Apr 27 2026 (04/27/2026, 11:40:56 UTC)
Source: AlienVault OTX General

Description

Xinference, an open-source distributed AI model inference framework, suffered a supply chain attack when attackers compromised PyPI release credentials of maintainers and published three malicious versions (2.6.0, 2.6.1, 2.6.2) on April 22, 2026. The malicious code, encoded in Base64 layers within __init__.py, executes automatically upon library installation or import, collecting cloud credentials, SSH keys, API tokens, database passwords, cryptocurrency wallets, and environment variables. The payload specifically targets AWS environments through metadata service exploitation and uploads stolen data to attacker-controlled infrastructure. The attack affects users who downloaded these versions from PyPI, which has over 680,000 total downloads. Attribution remains unclear as TeamPCP's name appears in the code but the group denies involvement, suggesting third-party impersonation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/27/2026, 12:15:12 UTC

Technical Analysis

This threat involves a supply chain poisoning attack on the Xinference Python package distributed via PyPI. Attackers compromised maintainer release credentials and uploaded three malicious versions containing Base64-encoded payloads within the __init__.py file. The payload activates automatically on installation or import, harvesting a wide range of sensitive credentials and secrets from the victim environment. It targets AWS cloud metadata services to extract credentials and uploads stolen data to attacker-controlled domains. The attack impacts users who installed or imported versions 2.6.0, 2.6.1, or 2.6.2 of Xinference. Attribution is uncertain due to denial by the implicated threat actor name found in the code. There is no vendor advisory or patch information available at this time, and no known active exploitation has been confirmed.

Potential Impact

Users who installed or imported the compromised Xinference package versions risk exposure of critical credentials including cloud access keys, SSH keys, API tokens, database passwords, and cryptocurrency wallets. This can lead to unauthorized access to cloud environments, data breaches, and potential financial loss. The attack specifically targets AWS metadata services, increasing risk for AWS cloud users. The widespread download count (over 680,000) indicates a significant potential exposure. However, no confirmed active exploitation in the wild has been reported so far.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until official guidance or patched versions are released, users should avoid installing or using Xinference versions 2.6.0, 2.6.1, and 2.6.2. Review and revoke any potentially exposed credentials and secrets that may have been compromised. Monitor for suspicious activity related to cloud accounts and infrastructure. Consider using alternative versions of Xinference or other frameworks until the issue is resolved. Follow updates from the Xinference maintainers and PyPI for official remediation steps.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
[]
Adversary
null
Pulse Id
69ef4b48b61dcb4f48409e68
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash3ee893ae46530b92e0d26435fb979d82
hash484067fd6232f7cdd7b664b33857fc2c
hash971670c10eff28339a085ca50a600e35
hash9b3257e45b27a6bbe4e240e41a3a306f
hashc6ce4e25f7fe3e3bb1eea2e9052483bf
hashe291734d46c313a23d676681499f8846
hash077d49fa708f498969d7cdffe701eb64675baaa4968ded9bd97a4936dd56c21c
hashe1e007ce4eab7774785617179d1c01a9381ae83abfd431aae8dba6f82d3ac127

Url

ValueDescriptionCopy
urlhttps://whereisitat.lucyatemysuperbox.space

Domain

ValueDescriptionCopy
domainwhereisitat.lucyatemysuperbox.space

Threat ID: 69ef4fc5ba26a39fba1ff6bf

Added to database: 4/27/2026, 12:00:05 PM

Last enriched: 4/27/2026, 12:15:12 PM

Last updated: 4/28/2026, 1:44:42 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses