CISA Advisories

Medtronic Hacked, 9M Records Stolen + Popular Dev Tool Turns Malicious

Two stories from today's threat landscape underline a hard truth: whether you're a patient, a developer, or just a regular person, attackers are coming after data you trust someone else to protect. Here's what happened and why it matters.

🩺 Medtronic Confirms Breach — 9 Million Records in ShinyHunters' Hands

Medical device giant Medtronic has officially confirmed it was hacked by the notorious ShinyHunters group, which claims to have stolen 9 million personal records and terabytes of internal corporate data. The attackers listed Medtronic on their leak site on April 17 with a ransom deadline of April 21 — and the company was quietly removed shortly after, suggesting a possible payoff.

Medtronic insists that manufacturing, products, and patient safety are unaffected, but it has not yet confirmed exactly what data was taken. For the millions of patients who depend on Medtronic pacemakers, insulin pumps, and other devices, this is a stark reminder that healthcare companies sit on some of the most sensitive personal information in existence — and they remain prime targets.

Read more

🐍 A Trusted Python Package Was Hijacked to Steal Credentials From a Million Developers

The popular Python package elementary-data — used by data engineers and downloaded over 1.1 million times per month — was compromised and weaponized to steal sensitive credentials. Attackers exploited a flaw in GitHub Actions to push a poisoned release (0.23.3) that quietly exfiltrated warehouse credentials, cloud API keys, SSH keys, and environment variables from anyone who installed it.

The malicious version was live for about 12 hours before being pulled, but that's more than enough time to do serious damage. If your team uses this package, upgrade to 0.23.4 immediately, check for a "trinny" marker file, purge caches, and rotate every secret that may have been exposed. This is supply-chain attack 101 — the tools your engineers trust are the new front door for attackers.

Read more

Stay ahead of threats with GOCO Security at gocosecurity.com.

Comments