Stawinski: How We Executed a Critical Supply Chain Attack on PyTorch
Our exploit path resulted in the ability to upload malicious PyTorch releases to GitHub, upload releases to AWS, potentially add code to the main repository branch, backdoor PyTorch dependencies – the list goes on. In short, it was bad. Quite bad.As we’ve seen before with SolarWinds, Ledger, and others, supply chain attacks like this are killer from an attacker’s perspective. With this level of access, any respectable nation-state would have several paths to a PyTorch supply chain compromise.
Posted Jan 15, 2024 18:21 UTC (Mon)
by carlosrodfern (subscriber, #166486)
[Link]
Posted Jan 15, 2024 19:45 UTC (Mon)
by ewen (subscriber, #4772)
[Link]
https://adnanthekhan.com/2023/12/20/one-supply-chain-atta...
And includes a list of several projects where they found problems. Of which PyTorch was just the first in the list.
Ewen
Stawinski: How We Executed a Critical Supply Chain Attack on PyTorch
Stawinski: How We Executed a Critical Supply Chain Attack on PyTorch