<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Mistralai Client-Python — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/mistralai-client-python/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 17:56:10 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/mistralai-client-python/feed.xml" rel="self" type="application/rss+xml"/><item><title>Malicious Dropper Found in mistralai PyPI Package 2.4.6</title><link>https://feed.craftedsignal.io/briefs/2026-05-mistralai-dropper/</link><pubDate>Mon, 18 May 2026 17:56:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mistralai-dropper/</guid><description>The mistralai PyPI package version 2.4.6 contains a malicious dropper that executes on import on Linux, downloading and executing a second-stage payload from a remote IP address, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>The <code>mistralai</code> PyPI package version <code>2.4.6</code> contains a malicious dropper that executes upon import on Linux systems. This malicious version was uploaded without a corresponding tag, commit, or release workflow run in the legitimate repository, and it bypassed the normal release pipeline that uses PyPI Trusted Publishing. The legitimate latest version before the malicious upload was <code>2.4.5</code>. Upon import, the package attempts to download and execute a file from a remote server. The <code>mistralai</code> PyPI project has been quarantined as a result. This incident highlights the risk of supply chain attacks targeting software dependencies and the importance of verifying package integrity. Defenders should monitor for unexpected network connections and file creations originating from Python interpreters.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious version 2.4.6 of the <code>mistralai</code> package is uploaded to PyPI.</li>
<li>A user installs the malicious package using <code>pip install mistralai==2.4.6</code>.</li>
<li>The user imports the <code>mistralai</code> package in a Python script (e.g., <code>import mistralai</code>).</li>
<li>The <code>_run_background_task</code> function in <code>src/mistralai/client/__init__.py</code> executes.</li>
<li>The function checks if the operating system is Linux and if the <code>MISTRAL_INIT</code> environment variable is set. If not, it proceeds.</li>
<li>The function attempts to download <code>https://83.142.209.194/transformers.pyz</code> to <code>/tmp/transformers.pyz</code> using <code>curl -k -L -s</code>.</li>
<li>If the download is successful, the function executes <code>/tmp/transformers.pyz</code> using the current Python interpreter via <code>_sub.Popen</code>, discarding stdout and stderr.</li>
<li>The second-stage payload in <code>transformers.pyz</code> executes, with the nature of its actions unknown, potentially leading to arbitrary code execution and system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of the dropper leads to the download and execution of an unknown second-stage payload on Linux systems. The impact is potentially severe, as the attacker could gain unauthorized access to the compromised system, exfiltrate sensitive data, install malware, or perform other malicious activities. Given the popularity of machine learning libraries, a successful attack could affect a wide range of users and organizations. Any Linux environment that imported <code>mistralai==2.4.6</code> should be treated as potentially compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately pin <code>mistralai</code> to version <code>2.4.5</code> or earlier to prevent further installations of the malicious package.</li>
<li>Rotate every credential reachable from any process that imported <code>mistralai==2.4.6</code> as described in the advisory.</li>
<li>Review host and cloud audit logs for activity from approximately 2026-05-12 00:05 UTC onward, per the advisory.</li>
<li>Monitor for outbound HTTPS connections to <code>83.142.209.194</code> originating from <code>curl</code> processes, as outlined in the IOCs.</li>
<li>Implement a detection rule to identify the execution of <code>/tmp/transformers.pyz</code> by a Python interpreter, based on the process execution information provided in the attack chain.</li>
<li>Block the domain <code>83.142.209.194</code> at the firewall or DNS resolver based on the IOCs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>malware</category><category>python</category></item></channel></rss>