2 Sources
[1]
TeamPCP hackers advertise Mistral AI code repos for sale
The TeamPCP hacker group is threatening to leak source code from the Mistral AI project unless a buyer is found for the data. In a post on a hacker forum, the threat actor is asking $25,000 for a set of nearly 450 repositories. Mistral AI is a French artificial intelligence company founded by former researchers from Google's DeepMind and Meta, which provides open-weight large language models (LLMs), both open source and proprietary. In a statement to BleepingComputer, Mistral AI confirmed that hackers compromised a codebase management system after the Mini Shai-Hulud software supply-chain attack. The incident started with the compromise of official packages from TanStack and Mistral AI through stolen CI/CD credentials and legitimate workflows. Then it spread to hundreds of other software projects on the npm and PyPI registries, including UiPath, Guardrails AI, and OpenSearch. "They [the hackers] contaminated some of our SDK packages for a brief period," the company said. TeamPCP claims to have stolen nearly 5 gigabytes "of internal repositories and source code" that Mistral uses for training, fine-tuning, benchmarking, model delivery, and inference in experiments and future projects. "We are looking for $25k BIN or they can pay this and we will shred these permanently, only selling to the best offer and limited to one person, if we cannot find a buyer within a week we will leak all of these for free to the forums," the hackers said. The threat actor appears open to negotiations, stating that the asking price is flexible and that interested buyers are free to submit what they believe is a fair offer for the 450 repositories offered for sale. Mistral AI told BleepingComputer that the TeamPCP managed to contaminate some of the company's software development kit (SDK) packages. In an advisory published earlier this week, the company said that the breach occurred after a developer device was impacted by the TanStack supply-chain attack. However, Mistral states that the forensic investigation determined that the impacted data was not part of the core code repositories. "Neither our hosted services, managed user data, nor any of our research and testing environments were compromised," Mistral told BleepingComputer. Earlier today, OpenAI also confirmed that the TanStack supply-chain impacted systems of two of its employees who had access to "a limited subset of internal source code repositories." A small set of credentials was stolen from the repositories, but the investigation found no evidence that they were used in additional attacks. OpenAI responded by rotating the code-signing certificates exposed in the incident and warning macOS users that they must update their OpenAI desktop apps before June 12, or the software may fail to launch and stop receiving updates.
[2]
Hackers threaten to leak Mistral files online -- AI giant confirms breach, but not what data is involved
* TeamPCP hackers stole 450 repositories from Mistral AI and are auctioning them on the dark web for ~$25K * Data includes ~5GB of internal source code for training, fine‑tuning, benchmarking, and model delivery * Group warned if no buyer emerges soon, they'll leak everything for free; Mistral confirmed SDK contamination but said core systems and user data were unaffected Hackers who recently stole 450 repositories from Mistral AI are now offering the large set of data to the highest bidder on the dark web - but if a buyer doesn't appear soon they will leak everything for free. The TeamPCP hacking group recently launched a supply chain attack called Mini Shai-Hulud against the TanStack npm package. TanStack is a collection of free software designed for building user interfaces with more than 177 million weekly downloads. By poisoning the package, TeamPCP managed to distribute an infostealer malware which harvested developer credentials, cloud secrets, and SSH keys. Flexible price In a statement shared with BleepingComputer, Mistral AI confirmed the criminals compromised a codebase management system. "They contaminated some of our SDK packages for a brief period," the company said, stressing that the impacted data was not part of the core code repositories: "Neither our hosted services, managed user data, nor any of our research and testing environments were compromised," Mistral said. This didn't stop TeamPCP from advertising the loot on the dark web for no more than $25,000 They're saying they stole five gigabytes of "internal repositories and source code" allegedly used for training, fine-tuning, benchmarking, model delivery, and inference in experiments and future projects. The sale is exclusive, meaning just one person will be getting the goods. TeamPCP also invited Mistral AI to buy it, and said that if a buyer isn't found within a week, everything will be leaked to the forums for free. The $25K price is negotiable, they said, and invited other actors to offer what they feel is a reasonable price. Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds.
Share
Copy Link
TeamPCP hackers are auctioning nearly 5GB of stolen Mistral AI source code for $25,000 on the dark web, threatening to release everything free if no buyer emerges. The French AI company confirmed its SDK packages were contaminated through the Mini Shai-Hulud supply-chain attack but insists core systems and user data remain secure.
Mistral AI faces a significant data breach after the TeamPCP hacker group stole nearly 450 repositories containing approximately 5 gigabytes of internal source code. The hackers are now advertising the stolen data on the dark web for $25,000, threatening to leak everything for free if no buyer emerges within a week
1
. The French AI company, founded by former researchers from Google's DeepMind and Meta, confirmed the breach stemmed from a sophisticated software supply-chain attack known as Mini Shai-Hulud that compromised its codebase management system2
.
Source: BleepingComputer
The incident began when TeamPCP poisoned official packages from TanStack, a widely-used collection of free software for building user interfaces with over 177 million weekly downloads. By compromising TanStack npm packages through stolen CI/CD credentials and legitimate workflows, the attackers distributed infostealer malware that harvested developer credentials, cloud secrets, and SSH keys
2
. The attack spread to hundreds of other software projects on the npm and PyPI registries, including UiPath, Guardrails AI, and OpenSearch. Mistral AI stated that a developer device was impacted by the TanStack supply-chain attack, which allowed hackers to contaminate some of the company's SDK packages for a brief period1
.TeamPCP claims the stolen repositories contain internal source code that Mistral AI uses for training, fine-tuning, benchmarking, model delivery, and inference in experiments and future projects related to AI model development
1
. However, Mistral AI's forensic investigation determined that the impacted data was not part of the core code repositories. The company emphasized that its hosted services, managed user data, and research and testing environments were not compromised1
. The hackers threaten to leak all stolen materials on forums if they cannot secure a buyer, with the asking price remaining flexible and open to negotiation2
.Related Stories
The Mistral AI breach is not an isolated incident. OpenAI also confirmed that the TanStack supply-chain attack impacted systems of two employees who had access to a limited subset of internal source code repositories. A small set of credentials was stolen, though OpenAI found no evidence they were used in additional attacks. In response, OpenAI rotated exposed code-signing certificates and warned macOS users to update their desktop apps before June 12 or face potential launch failures
1
. The incident highlights growing vulnerabilities in software development pipelines across the AI sector, where compromised developer tools can cascade into widespread security breaches affecting multiple organizations simultaneously.
Source: TechRadar
Summarized by
Navi
[1]
12 May 2026•Technology

11 Nov 2025•Technology

02 Apr 2026•Technology

1
Technology

2
Technology

3
Business and Economy
