PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials

PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials — Ravie LakshmananApr 30, 2026Supply Chain Attack / Malware [https://

pytorch-lightning-and-intercom-client-hit-in-supply-chain-attacks-to-steal-crede

What’s new: PyTorch Lightning versions 2.6.2 and 2.6.3 have been compromised in a supply chain attack, leading to credential theft. The malicious packages were published on April 30, 2026, and contain a hidden directory that executes a JavaScript payload for credential harvesting. The attack is linked to the ongoing Mini Shai-Hulud campaign, which has also affected the intercom-client npm package.

Who’s affected

Users of PyTorch Lightning versions 2.6.2 and 2.6.3, as well as users of the intercom-client version 7.0.4, are at risk. The attack targets developers and CI/CD environments, potentially compromising GitHub tokens and other credentials.

What to do

  • Block and remove PyTorch Lightning versions 2.6.2 and 2.6.3 from your systems.
  • Downgrade to the last known clean version, 2.6.1.
  • Rotate any credentials that may have been exposed in affected environments.
  • Monitor for unusual activity in your development and CI/CD environments.

Sources