← Back to Tech & Science

Cybersecurity Breach Targets PyTorch Lightning and Intercom Packages

Tech & ScienceAI-Generated & Algorithmically Scored·

AI-generated from multiple sources. Verify before acting on this reporting.

LONDON (AP) — Two prominent cybersecurity threat groups, TeamPCP and LAPSUS$, have been linked to a coordinated supply chain attack targeting the PyTorch Lightning and Intercom-client software packages. The operation, detected late Thursday, involved the insertion of malicious code designed to harvest user credentials from affected systems.

The attack was identified on April 30, 2026, at 17:24 UTC. Security researchers discovered that the compromised packages, widely used in machine learning development and customer communication infrastructure, contained hidden scripts that transmitted authentication data to external servers. The specific location of the attackers remains undisclosed.

PyTorch Lightning is an open-source framework that simplifies the training of deep learning models, while Intercom-client serves as a bridge for customer messaging applications. Both packages are integral to numerous enterprise and research environments. The compromise allowed threat actors to intercept login information, potentially granting unauthorized access to sensitive corporate networks and personal accounts.

TeamPCP and LAPSUS$ are known for targeting high-value software infrastructure. Previous operations by these groups have focused on disrupting supply chains and exfiltrating proprietary data. The current attack follows a pattern of credential theft aimed at facilitating further intrusions into victim organizations.

The malicious code was embedded within legitimate package updates, making detection difficult for end users. Once installed, the scripts executed silently in the background, capturing usernames, passwords, and session tokens before transmitting them to command-and-control servers. The extent of the data exfiltration is still being assessed.

Software maintainers for both packages have issued emergency patches to remove the compromised code. Users are urged to update their systems immediately and rotate all credentials that may have been exposed. Security advisories recommend implementing multi-factor authentication as an additional layer of protection.

The attack highlights the growing vulnerability of software supply chains to targeted intrusions. As organizations increasingly rely on third-party components, the risk of compromise through indirect channels continues to rise. The involvement of established threat groups suggests a coordinated effort to exploit trusted software ecosystems.

Questions remain regarding the full scope of the breach and the number of affected users. Investigators are working to trace the origin of the attack and determine whether other packages were targeted. The incident underscores the need for enhanced security measures in software development and distribution pipelines.

As of Friday morning, no official statements have been released by the threat actors. The cybersecurity community continues to monitor for signs of further activity related to the compromised packages.