BotBeat
...
← Back

> ▌

MicrosoftMicrosoft
INDUSTRY REPORTMicrosoft2026-05-19

Microsoft's Durabletask Package on PyPI Compromised in Major Supply Chain Attack

Key Takeaways

  • ▸Three compromised versions of Microsoft's durabletask package contain a silent dropper that executes remote payloads at import time, with no visible user indicators
  • ▸The second-stage payload is an infostealer and worm that targets cloud credentials, password managers, and developer tools with multi-cloud propagation capabilities (AWS SSM, Kubernetes)
  • ▸The attack is highly sophisticated with multiple entry points across the package and environmental checks to maximize effectiveness while avoiding detection in sandboxes
Source:
Hacker Newshttps://www.aikido.dev/blog/durabletask-package-compromised-mini-shai-hulud↗

Summary

Three malicious versions of Microsoft's durabletask package (1.4.1, 1.4.2, 1.4.3) have been discovered on PyPI containing a sophisticated dropper mechanism injected directly into the Python source code. When developers install and import the library, the dropper silently fetches and executes a second-stage payload from a newly registered C2 domain (check.git-service.com), running completely undetected in a detached background process.

The second-stage payload, delivered as a Python zipapp named rope.pyz, is a full-featured infostealer and worm designed to target cloud developers. It harvests credentials from major cloud providers (AWS, Azure, GCP), password managers, and developer tools, encrypts them with an attacker-controlled RSA key, and exfiltrates them to the command and control server. The payload includes sophisticated propagation capabilities, automatically spreading to other EC2 instances via AWS Systems Manager (SSM) and to other nodes in Kubernetes clusters via kubectl exec.

The durabletask package is a Python implementation of Microsoft's Durable Task Framework, a workflow orchestration library commonly used in cloud-native environments for automation, CI/CD pipelines, and Azure-integrated workloads. The malicious dropper is Linux-only with checks to avoid execution in sandboxed environments and Russian-locale systems. The C2 domain was registered only three days before this analysis, indicating an active, ongoing campaign targeting infrastructure professionals with high-privilege access to enterprise cloud environments.

  • The C2 infrastructure was registered only three days before the analysis, indicating this is an active, targeted campaign with possible attribution to threat group TeamPCP

Editorial Opinion

This supply chain attack represents a critical vulnerability in the Python ecosystem's package distribution infrastructure. The targeting of a workflow orchestration library used in cloud-native CI/CD and infrastructure automation is particularly dangerous, as compromised credentials could grant attackers broad access to enterprise cloud environments. The sophisticated payload design—including multi-cloud propagation, credential harvesting, and environment-aware operational security—indicates this is a well-resourced operation with substantial expertise. Organizations using the affected durabletask versions must immediately rotate all credentials that may have been exposed to these systems.

MLOps & InfrastructureCybersecurityPrivacy & Data

More from Microsoft

MicrosoftMicrosoft
RESEARCH

Microsoft Releases Comprehensive Guidelines for Human-AI Interaction Based on 20+ Years of Research

2026-05-20
MicrosoftMicrosoft
PRODUCT LAUNCH

Microsoft Agent 365: The $15/user Governance Layer for Autonomous Enterprise AI

2026-05-20
MicrosoftMicrosoft
PRODUCT LAUNCH

Microsoft Launches New AI-Accelerated Surface Devices for Enterprise

2026-05-19

Comments

Suggested

AnthropicAnthropic
PARTNERSHIP

Anthropic Expands Partnership with SpaceX, Scales GB200 Capacity in Colossus 2

2026-05-20
Research CommunityResearch Community
RESEARCH

New Methodology Proposed for Selecting Runtime Architecture Patterns in Production LLM Agents

2026-05-20
AnthropicAnthropic
POLICY & REGULATION

Advanced AI Models Bring Government to 'Reflection Point,' CIA Official Says

2026-05-20
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us