{"id":49971,"date":"2023-01-03T21:25:36","date_gmt":"2023-01-03T21:25:36","guid":{"rendered":"https:\/\/www.darkreading.com\/application-security\/cyberattackers-torch-python-machine-learning-project"},"modified":"2023-01-03T21:25:36","modified_gmt":"2023-01-03T21:25:36","slug":"cyberattackers-torch-python-machine-learning-project","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/","title":{"rendered":"Cyberattackers Torch Python Machine Learning Project"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt444d6b575dbeffa0\/63b4a99074cf97411243627b\/torch-Regis-Martin-Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>An unknown attacker slipped a malicious binary into the PyTorch machine learning project by registering a malicious project with the Python Package Index (PyPI), infecting users&#8217; machines if they downloaded a nightly build between Dec. 25 and Dec. 30.<\/p>\n<p>The PyTorch Foundation stated in an advisory on Dec. 31 that the effort was a <a href=\"https:\/\/www.darkreading.com\/dr-tech\/new-application-security-toolkit-uncovers-dependency-confusion-attacks\" target=\"_blank\" rel=\"noopener\">dependency confusion attack<\/a>, in which an unknown entity created a package in the Python Package Index with the same name, <em>torchtriton<\/em>, as a code library on which the PyTorch project depends. The malicious library included the functions normally used by PyTorch but with a malicious modification: It would upload data from the victim&#8217;s system to a server at a now-defunct domain.<\/p>\n<p>The malicious function would grab a variety of system-specific information, the username, environment variables, a list of hosts to which the victim&#8217;s machine connects, the list of password hashes, and the first 1,000 files in the user&#8217;s home directory.<\/p>\n<p>&#8220;Since the PyPI index takes precedence, this malicious package was being installed instead of the version from our official repository,&#8221; <a href=\"https:\/\/pytorch.org\/blog\/compromised-nightly-dependency\/#how-to-check-if-your-python-environment-is-affected\" target=\"_blank\" rel=\"noopener\">the advisory stated<\/a>. &#8220;This design enables somebody to register a package by the same name as one that exists in a third party index, and [the package manager] will install their version by default.&#8221;<\/p>\n<p>The attack is the latest software supply chain attack to target open source repositories. In mid-December, for example, researchers <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/malicious-python-trojan-impersonates-sentinelone-security-client\" target=\"_blank\" rel=\"noopener\">discovered a malicious package<\/a> disguised as a client from cybersecurity firm SentinelOne that had been uploaded to PyPI. In another dependency confusion attack in November, attackers <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/w4sp-stealer-aims-to-sting-python-developers-in-supply-chain-attack\" target=\"_blank\" rel=\"noopener\">created more than two dozen clones of popular software<\/a> with names designed to fool unwary developers. Similar attacks <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/automated-cybercampaign-attacks-bogus-software-building-blocks\" target=\"_blank\" rel=\"noopener\">have targeted<\/a> the .NET-focused Nuget repository and the Node.js Package Manager (npm) ecosystem.<\/p>\n<h2 class=\"regular-text\">Same Name, Different Packages<\/h2>\n<p>In the latest attack on PyTorch, the attacker used the name of a software package that PyTorch developers would load from the project&#8217;s private repository, and because the malicious package existed in the PyPI repository, it gained precedence. The PyTorch Foundation removed the dependency in its nightly builds and replaced the PyPI project with a benign package, the advisory stated.<\/p>\n<p>The group also removed any nightly builds that depend on the <em>torchtriton<\/em> dependency from the project&#8217;s download page and says it plans to take ownership of the <em>torchtriton<\/em> project on PyPI.<\/p>\n<p>Fortunately, because the <em>torchtritan<\/em> dependency was only imported into the nightly builds of the program, the impact of the attack did not propagate to typical users, Paul Ducklin, a principal research scientist at cybersecurity firm Sophos, said <a href=\"https:\/\/nakedsecurity.sophos.com\/2023\/01\/01\/pytorch-machine-learning-toolkit-pwned-from-christmas-to-new-year\/\" target=\"_blank\" rel=\"noopener\">in a blog post<\/a>.<\/p>\n<p>&#8220;We&#8217;re guessing that the majority of PyTorch users won&#8217;t have been affected by this, either because they don&#8217;t use nightly builds, or weren&#8217;t working over the vacation period, or both,&#8221; he wrote. &#8220;But if you are a PyTorch enthusiast who does tinker with nightly builds, and if you&#8217;ve been working over the holidays, then even if you can&#8217;t find any clear evidence that you were compromised, you might nevertheless want to consider generating new SSH key pairs as a precaution, and updating the public keys that you&#8217;ve uploaded to the various servers that you access via SSH.&#8221;<\/p>\n<p>The PyTorch Foundation confirmed that users of the stable version of the PyTorch library would not be affected by the issue.<\/p>\n<h2 class=\"regular-text\">Mistaken Intentions?<\/h2>\n<p>In a widely circulated <em>mea culpa<\/em>, the attacker claimed that they are a legitimate researcher and that the issue resulted from their investigation into dependency confusion issues.<\/p>\n<p>&#8220;I want to assure that it was not my intention to steal someone&#8217;s secrets,&#8221; <a href=\"https:\/\/twitter.com\/bad_requests\/status\/1609588336112599041\" target=\"_blank\" rel=\"noopener\">the person wrote<\/a>, claiming to have notified Facebook on Dec. 29 of the issue and made reports to companies using the HackerOne crowdsourcing platform. &#8220;Had my intents been malicious, I would never have filled [sic] any bug bounty reports, and would have just sold the data to the highest bidder.&#8221;<\/p>\n<p>Because of the statement, some experts considered the PyTorch advisory to be <a href=\"https:\/\/twitter.com\/vxunderground\/status\/1609589042017878016\" target=\"_blank\" rel=\"noopener\">a &#8220;false alarm,&#8221;<\/a> but there have been other attackers that have <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/school-kid-uploads-ransomware-scripts-to-pypi-repository-as-fun-research-project\" target=\"_blank\" rel=\"noopener\">donned the mantle of a misunderstood researcher<\/a>.<\/p>\n<p>Moreover, the impact of the attack could have exposed victims&#8217; sensitive information, even if the person behind the malware had good intentions, Sophos&#8217; Ducklin wrote in a blog post about the software supply chain attack.<\/p>\n<p>&#8220;How is this a &#8216;false alarm&#8217;? &#8221; <a href=\"https:\/\/twitter.com\/duckblog\/status\/1610227902733336577\" target=\"_blank\" rel=\"noopener\">he also said in a tweet<\/a>. &#8220;This malware deliberately steals your data\u2026 and transmits it scrambled, not encrypted &#8230; so anyone on your network path who recorded it can trivially decode it.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/application-security\/cyberattackers-torch-python-machine-learning-project\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The popular PyTorch Python project for data scientists and machine learning developers has become the latest open source project to be targeted with a dependency confusion attack.Read More <a href=\"https:\/\/www.darkreading.com\/application-security\/cyberattackers-torch-python-machine-learning-project\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-49971","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattackers Torch Python Machine Learning Project 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattackers Torch Python Machine Learning Project 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-03T21:25:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt444d6b575dbeffa0\/63b4a99074cf97411243627b\/torch-Regis-Martin-Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattackers-torch-python-machine-learning-project\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattackers-torch-python-machine-learning-project\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cyberattackers Torch Python Machine Learning Project\",\"datePublished\":\"2023-01-03T21:25:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattackers-torch-python-machine-learning-project\\\/\"},\"wordCount\":751,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattackers-torch-python-machine-learning-project\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt444d6b575dbeffa0\\\/63b4a99074cf97411243627b\\\/torch-Regis-Martin-Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattackers-torch-python-machine-learning-project\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattackers-torch-python-machine-learning-project\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattackers-torch-python-machine-learning-project\\\/\",\"name\":\"Cyberattackers Torch Python Machine Learning Project 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattackers-torch-python-machine-learning-project\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattackers-torch-python-machine-learning-project\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt444d6b575dbeffa0\\\/63b4a99074cf97411243627b\\\/torch-Regis-Martin-Alamy.jpg\",\"datePublished\":\"2023-01-03T21:25:36+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattackers-torch-python-machine-learning-project\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattackers-torch-python-machine-learning-project\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattackers-torch-python-machine-learning-project\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt444d6b575dbeffa0\\\/63b4a99074cf97411243627b\\\/torch-Regis-Martin-Alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt444d6b575dbeffa0\\\/63b4a99074cf97411243627b\\\/torch-Regis-Martin-Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyberattackers-torch-python-machine-learning-project\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberattackers Torch Python Machine Learning Project\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattackers Torch Python Machine Learning Project 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/","og_locale":"en_US","og_type":"article","og_title":"Cyberattackers Torch Python Machine Learning Project 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-01-03T21:25:36+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt444d6b575dbeffa0\/63b4a99074cf97411243627b\/torch-Regis-Martin-Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cyberattackers Torch Python Machine Learning Project","datePublished":"2023-01-03T21:25:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/"},"wordCount":751,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt444d6b575dbeffa0\/63b4a99074cf97411243627b\/torch-Regis-Martin-Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/","url":"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/","name":"Cyberattackers Torch Python Machine Learning Project 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt444d6b575dbeffa0\/63b4a99074cf97411243627b\/torch-Regis-Martin-Alamy.jpg","datePublished":"2023-01-03T21:25:36+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt444d6b575dbeffa0\/63b4a99074cf97411243627b\/torch-Regis-Martin-Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt444d6b575dbeffa0\/63b4a99074cf97411243627b\/torch-Regis-Martin-Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cyberattackers-torch-python-machine-learning-project\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyberattackers Torch Python Machine Learning Project"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=49971"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49971\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=49971"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=49971"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=49971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}