-
Notifications
You must be signed in to change notification settings - Fork 10
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'release-4.2.0' into 'main'
Release 4.2.0 See merge request advml/atlas-data!84
- Loading branch information
Showing
9 changed files
with
311 additions
and
7 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,71 @@ | ||
--- | ||
id: AML.CS0015 | ||
object-type: case-study | ||
name: Compromised PyTorch Dependency Chain | ||
summary: >- | ||
Linux packages for PyTorch's pre-release version, called Pytorch-nightly, | ||
were compromised from December 25 to 30, 2022 by a malicious binary uploaded to the Python Package Index | ||
(PyPI) code repository. The malicious binary had the same name as a PyTorch dependency | ||
and the PyPI package manager (pip) installed this malicious package instead of the legitimate one. | ||
This supply chain attack, also known as "dependency confusion," exposed sensitive | ||
information of Linux machines with the affected pip-installed versions of PyTorch-nightly. | ||
On December 30, 2022, PyTorch announced the incident and initial steps towards mitigation, | ||
including the rename and removal of `torchtriton` dependencies. | ||
incident-date: 2022-12-25 | ||
incident-date-granularity: DATE | ||
procedure: | ||
- tactic: AML.TA0004 | ||
technique: AML.T0010.001 | ||
description: >- | ||
A malicious dependency package named `torchtriton` was uploaded to the | ||
PyPI code repository with the same package name | ||
as a package shipped with the PyTorch-nightly build. This malicious | ||
package contained additional code that uploads sensitive data | ||
from the machine. | ||
The malicious `torchtriton` package was installed instead of the legitimate one because | ||
PyPI is prioritized over other sources. See more details at [this GitHub issue](https://github.com/pypa/pip/issues/8606). | ||
- tactic: AML.TA0009 | ||
technique: AML.T0037 | ||
description: >- | ||
The malicious package surveys the affected system for basic | ||
fingerprinting info (such as IP address, username, and current working | ||
directory), and steals further sensitive data, including: | ||
- nameservers from `/etc/resolv.conf` | ||
- hostname from `gethostname()` | ||
- current username from `getlogin()` | ||
- current working directory name from `getcwd()` | ||
- environment variables | ||
- `/etc/hosts` | ||
- `/etc/passwd` | ||
- the first 1000 files in the user's `$HOME` directory | ||
- `$HOME/.gitconfig` | ||
- `$HOME/.ssh/*.` | ||
- tactic: AML.TA0010 | ||
technique: AML.T0025 | ||
description: >- | ||
All gathered information, including file contents, is uploaded via | ||
encrypted DNS queries to the domain `*[dot]h4ck[dot]cfd`, using the DNS | ||
server `wheezy[dot]io`. | ||
reporter: PyTorch | ||
actor: Unknown | ||
target: PyTorch | ||
case-study-type: incident | ||
references: | ||
- title: PyTorch statement on compromised dependency | ||
url: https://pytorch.org/blog/compromised-nightly-dependency/ | ||
- title: Analysis by BleepingComputer | ||
url: >- | ||
https://www.bleepingcomputer.com/news/security/pytorch-discloses-malicious-dependency-chain-compromise-over-holidays/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.