Ultralytics YOLO11 Under Fire: Cryptominer Chaos Strikes Python Users
Ultralytics YOLO11 AI model got caught moonlighting as a cryptominer thanks to a supply chain attack. Users installing versions 8.3.41 and 8.3.42 found their devices mining cryptocurrency instead of detecting objects. The cryptominer was swiftly booted, and a clean version, 8.3.43, is now available.

Hot Take:
When life gives you YOLO, make sure it’s not mining cryptocurrency on the side! Ultralytics YOLO11 finds itself in hot water as it moonlights as a cryptominer, proving once again that AI models are up for anything… even mining Monero while you sleep.
Key Points:
- Ultralytics YOLO11 AI model was compromised in a supply chain attack, leading to the deployment of cryptominers on certain devices.
- The affected versions, 8.3.41 and 8.3.42, were quickly pulled from Python Package Index (PyPI) and replaced with version 8.3.43.
- Google Colab accounts using the compromised versions were flagged and banned for “abusive activity.”
- The attack involved an XMRig Miner connecting to a mining pool, and the breach originated from malicious pull requests.
- Ultralytics is conducting a full security audit and working on additional safeguards to prevent future incidents.
Already a member? Log in here