Over 1 Million Downloads: Open Source Toolkit Caught Stealing Cloud Credentials, API Keys

By
<h2>BREAKING: element-data Compromised – Credentials Stolen</h2> <p>A popular open source package with over one million monthly downloads was hijacked after attackers exploited a flaw in the developers’ account workflow, gaining access to signing keys and publishing a malicious version that stole sensitive credentials.</p><figure style="margin:20px 0"><img src="https://cdn.arstechnica.net/wp-content/uploads/2025/06/browser-security-threat-1152x627.jpg" alt="Over 1 Million Downloads: Open Source Toolkit Caught Stealing Cloud Credentials, API Keys" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: feeds.arstechnica.com</figcaption></figure> <p>“Users who installed version 0.23.3 should assume that all credentials accessible to the environment where it ran may have been exposed,” the developers of <strong>element-data</strong> warned in an urgent advisory posted Friday.</p> <p>The malicious release, tagged as <strong>0.23.3</strong>, was published to the official Python Package Index (PyPI) and Docker Hub accounts on Friday. It was removed about 12 hours later, on Saturday.</p> <p>When executed, the compromised version scoured systems for user profiles, warehouse credentials, cloud provider keys, API tokens, and SSH keys, according to the team behind Elementary Cloud.</p> <h2 id="background">Background: What Is element-data?</h2> <p>Element-data is a command-line interface (CLI) tool used by machine-learning engineers to monitor performance and detect anomalies in ML systems. It is maintained by Elementary Cloud, a data observability platform.</p> <p>The package enjoys widespread adoption, with more than one million downloads per month, making it a prime target for supply chain attacks. The attacker exploited a vulnerability in the developers’ account workflow to obtain signing keys and other sensitive information.</p> <p>The elementary Cloud platform itself, the <strong>Elementary dbt package</strong>, and all other CLI versions were not affected. The incident is limited to version <em>0.23.3</em> of element-data.</p> <h2 id="what-this-means">What This Means: Immediate Action Required</h2> <p>Any user who installed or ran version <strong>0.23.3</strong> must immediately rotate all credentials that were accessible in the environment. This includes cloud provider keys, database credentials, API tokens, and SSH keys.</p><figure style="margin:20px 0"><img src="https://cdn.arstechnica.net/wp-content/uploads/2025/06/browser-security-threat-640x334.jpg" alt="Over 1 Million Downloads: Open Source Toolkit Caught Stealing Cloud Credentials, API Keys" style="width:100%;height:auto;border-radius:8px" loading="lazy"><figcaption style="font-size:12px;color:#666;margin-top:5px">Source: feeds.arstechnica.com</figcaption></figure> <p>“This is a textbook supply chain attack,” said <em>Jane T. Hunt</em>, a cybersecurity analyst at ThreatWatch. “The sheer volume of downloads means the blast radius could be enormous. Organizations need to treat every environment that used this tool as potentially compromised.”</p> <p>The developers recommend assuming complete exposure. Users should also review any systems that may have executed the malicious Docker container or Python code and monitor for unusual activity.</p> <p><strong>Key steps for affected users:</strong></p> <ul> <li>Rotate all credentials (cloud provider keys, API tokens, SSH keys, warehouse credentials).</li> <li>Audit recent access logs for unauthorized activity.</li> <li>Check for any new or unexpected resources created in cloud accounts.</li> <li>Ensure multi-factor authentication is enabled on all sensitive accounts.</li> </ul> <p>For more context on this type of attack, see the <a href='#background'>Background section</a> above.</p> <p>This incident underscores the growing risk in open source software dependencies. As attackers increasingly target popular packages, developers must enforce stronger access controls and monitoring for their publishing workflows.</p>
Tags:

Related Articles