← Back to Home
April 01, 2026

Baidu Robotaxis Freeze While Hackers Target Code Libraries

Baidu Robotaxis Freeze in Traffic, Trap Passengers in Chaos
ROBOTICS

Baidu Robotaxis Freeze in Traffic, Trap Passengers in Chaos

Over 100 Baidu robotaxis turned into high-tech prison cells this week, freezing mid-journey and trapping passengers inside while causing traffic mayhem across Wuhan, China.

This wasn't just a minor glitch—police fielded dozens of emergency calls as the Apollo Go fleet simultaneously suffered what officials diplomatically called a "system failure." Imagine being stuck in rush hour traffic, except your car literally can't move and there's no human driver to take over.

The timing couldn't be worse for Baidu's autonomous vehicle ambitions. The Chinese tech giant has been aggressively expanding its robotaxi empire, deploying over 500 driverless cars in Wuhan alone and operating in 26 cities worldwide. They've even struck partnerships with Uber to bring their technology to London and Dubai.

But here's what makes this incident particularly troubling: it demonstrates how quickly widespread autonomous vehicle deployment can turn from convenience to crisis. When traditional cars break down, they typically affect one vehicle. When a robotaxi network fails, it can simultaneously strand hundreds of passengers across an entire city.

China has been betting big on autonomous vehicles, viewing them as a key technology for maintaining its competitive edge in the global tech race. Cities like Wuhan have essentially become testing grounds for this future, with residents serving as willing guinea pigs for largely unproven technology.

The incident exposes the fundamental vulnerability of centralized autonomous vehicle systems. If all these robotaxis were relying on the same software or network infrastructure, a single point of failure could cascade across the entire fleet—which appears to be exactly what happened.

Wuhan police reported at least one accident resulted from the chaos, though no injuries were confirmed. That's remarkably fortunate considering the scale of the malfunction. Traffic systems aren't designed to handle hundreds of vehicles suddenly stopping in the middle of roads.

Baidu's silence on the matter is telling. The company hasn't explained what caused the failure or what safeguards exist to prevent future incidents. For a company that's built its reputation on reliability and safety, this radio silence feels like damage control rather than transparency.

This incident will undoubtedly fuel skeptics who argue that autonomous vehicle technology is being deployed too quickly without adequate safety measures. When your worst-case scenario actually happens, it's hard to argue for moving fast and breaking things—especially when "things" include passenger safety and urban traffic flow.
Source: The Verge
Hackers Plant Trojan in Internet's Most Popular Code Library
SECURITY

Hackers Plant Trojan in Internet's Most Popular Code Library

Cybercriminals just pulled off one of the most sophisticated supply chain attacks in recent memory, successfully planting malicious code in a library used by millions of developers worldwide.

The target was npm, the package repository that essentially functions as the internet's code grocery store. When developers need pre-built functions—whether for handling HTTP requests, processing payments, or managing user authentication—they shop at npm. It hosts over 2 million packages that get downloaded billions of times monthly.

Hackers managed to compromise a maintainer's authentication token for Axios, one of npm's most popular packages. Axios handles HTTP requests for countless websites and applications, making it a prime target for anyone wanting maximum impact from their attack. It's like poisoning the water supply instead of individual wells.

The malicious code functioned as a Remote Access Trojan (RAT), potentially giving attackers backdoor access to any system that installed the compromised version. This means the breach could have affected thousands of companies and millions of users without anyone initially realizing it.

Supply chain attacks have become the weapon of choice for sophisticated hackers because they're incredibly efficient. Instead of breaking into individual companies, attackers compromise widely-used software components and let their targets come to them. It's like hiding a bomb in a popular brand of smartphone batteries.

The timing suggests this was a highly coordinated operation. The attackers didn't just stumble upon the maintainer's credentials—they specifically targeted someone with the ability to push updates to a critical package. This level of precision indicates either insider knowledge or extensive reconnaissance.

What makes this particularly concerning is how long such attacks can go undetected. Unlike flashy ransomware operations, supply chain attacks are designed to blend in. The malicious code could have been silently collecting data or establishing persistent access for weeks before discovery.

The npm ecosystem's structure makes it inherently vulnerable to these attacks. The platform operates on trust—developers assume that popular, well-maintained packages are safe. This incident shatters that assumption and highlights how a single compromised credential can have cascading effects across the entire software ecosystem.

For businesses, this attack serves as a wake-up call about third-party risk management. Every external library or service represents a potential attack vector. Companies that haven't been auditing their software dependencies might want to start.

The broader implications extend beyond just one compromised package. This attack demonstrates that no part of our digital infrastructure is immune to sophisticated threats, and the tools we rely on to build the modern internet can be turned against us.
Source: VentureBeat

Enjoyed this?

Get stories like this delivered every Tuesday — free.