Malicious PyTorch Lightning Package Steals Credentials and Worms npm Packages

✍️ OpenClawRadar📅 Published: April 30, 2026🔗 Source
Malicious PyTorch Lightning Package Steals Credentials and Worms npm Packages
Ad

The PyPI package lightning — a deep learning framework used for image classification, LLM fine-tuning, diffusion models, and time-series forecasting — was compromised in a supply chain attack affecting versions 2.6.2 and 2.6.3, published on April 30, 2026. Simply running pip install lightning triggers the malicious code on import.

What the Malware Does

The malicious versions contain a hidden _runtime directory with obfuscated JavaScript payload that executes automatically upon module import. It steals:

  • Credentials and authentication tokens
  • Environment variables
  • Cloud secrets

It also attempts to poison GitHub repositories by creating public repos named EveryBoiWeBuildIsaWormBoi. The attack uses Dune-themed naming conventions, consistent with the previous Mini Shai-Hulud campaign.

Cross-Ecosystem Spread: PyPI to npm

While the entry point is PyPI, the malware payload is JavaScript. Once running, if it finds npm publish credentials, it injects a setup.mjs dropper and router_runtime.js into every package that token can publish to. It sets scripts.preinstall to execute the dropper, bumps the patch version, and republishes. Any downstream developer who installs those packages runs the full malware, leading to token theft and further worm propagation.

Ad

Indicators of Compromise

Audit your projects for:

  • Unexpected .claude/ or .vscode/ directories with strange contents
  • New public repositories named EveryBoiWeBuildIsaWormBoi
  • Unexpected npm packages published under your account

Remediation

If you have lightning version 2.6.2 or 2.6.3 in any project:

  • Remove the package and downgrade to a safe version
  • Rotate all GitHub tokens, cloud credentials, and API keys that were present in the affected environment
  • Scan your repositories for the injected files listed above
  • Check your npm tokens and audit published packages for unauthorized modifications

Semgrep has published an advisory and rule; trigger a new scan on your projects and check the advisories page at semgrep.dev/orgs/-/advisories to see if any projects have installed these versions.

📖 Read the full source: HN AI Agents

Ad

👀 See Also