Threat IntelHIGH

TeamPCP Supply Chain Attack - LiteLLM Packages Compromised

HNHelp Net Security
LiteLLMTeamPCPPyPIsupply chain attackmalware
🎯

Basically, hackers tricked a popular software library into spreading malware.

Quick Summary

TeamPCP has compromised LiteLLM packages on PyPI, embedding malware that steals sensitive data. Developers and organizations using this library are at risk. Immediate action is needed to secure systems and credentials.

What Happened

On March 24, 2026, the cybercriminal group known as TeamPCP compromised two versions of the LiteLLM library on the Python Package Index (PyPI). These versions, 1.82.7 and 1.82.8, contained malicious code designed to steal credentials and deploy additional malware. This incident is part of a broader series of supply chain attacks targeting popular open-source tools, which has raised significant concerns in the cybersecurity community.

The compromised LiteLLM library is crucial for applications that switch between various large language models (LLMs). By infiltrating this library, TeamPCP exploited its position to access sensitive data, including API keys and environment variables. This method allows attackers to intercept valuable information without needing to breach upstream systems directly.

Who's Behind It

The TeamPCP group has gained notoriety for its sophisticated supply chain attacks, which have increasingly targeted developers and cloud environments. Their strategy involves compromising maintainer accounts and pushing malicious workflows, as seen in previous attacks on other tools like Aqua’s Trivy and CheckMarx’s VS Code extensions. The attackers capitalize on the trust users place in open-source software, making their operations particularly effective.

In the case of LiteLLM, the attack followed a pattern established in earlier incidents, indicating a well-coordinated effort to exploit vulnerabilities in the software development lifecycle. The group’s approach suggests a broad targeting strategy, aiming to disrupt the development processes of organizations leveraging open-source solutions for AI applications.

What Data Was Exposed

The compromised LiteLLM packages allowed attackers to potentially exfiltrate sensitive configuration data. This includes:

  • API keys
  • Environment variables
  • SSH keys and cloud tokens
  • CI/CD secrets
  • Crypto wallets

Given the library's role in facilitating communication between applications and AI service providers, the impact of this breach could be severe for organizations that rely on LiteLLM. The malware embedded in the packages was designed to operate stealthily, making it difficult for users to detect its presence until significant damage was done.

What You Should Do

Organizations that have installed or executed the compromised LiteLLM versions should take immediate action. Here are the recommended steps:

  1. Identify and remove the malicious LiteLLM packages from affected systems.
  2. Rotate all potentially exposed credentials, including API keys and SSH tokens.
  3. Conduct a thorough investigation to uncover any persistence mechanisms or additional payloads that may have been dropped during the compromise.
  4. In many cases, it may be safest to rebuild affected systems from a known clean state to ensure complete removal of the malware.

The removal of the malicious packages from PyPI does not eliminate the risks associated with this attack. Organizations must remain vigilant and proactive in safeguarding their development environments against similar threats in the future.

🔒 Pro insight: Analysis pending for this article.

Original article from

Help Net Security · Zeljka Zorz

Read Full Article

Related Pings

HIGHThreat Intel

Phishing Alert - GTFire Exploits Google Services

GTFire is exploiting Google services to enhance phishing schemes. Users worldwide are at risk of falling victim to these sophisticated attacks. Awareness and caution are essential to stay safe.

Group-IB Blog·
HIGHThreat Intel

TeamPCP - Expands Supply Chain Campaign with LiteLLM Compromise

A popular Python package, LiteLLM, was compromised by malware linked to TeamPCP. This breach could lead to significant credential theft across many systems. Organizations are urged to take immediate action to secure their environments.

Infosecurity Magazine·
HIGHThreat Intel

Threat Intel - TeamPCP Expands OSS Compromise Campaign

TeamPCP has launched a wide-ranging attack on open-source platforms like Docker Hub and PyPI. This campaign compromises sensitive data and credentials, affecting thousands of developers. Organizations are urged to enhance their security measures to combat these threats effectively.

SecurityWeek·
HIGHThreat Intel

Cyberattack Trends - Insights from Kaspersky's 2026 Report

Kaspersky's latest report reveals significant trends in cyberattacks from 2025. Key sectors like government and IT are increasingly targeted. Understanding these trends is crucial for enhancing cybersecurity measures.

Kaspersky Securelist·
HIGHThreat Intel

Threat Intel - Malicious LiteLLM Versions Linked to TeamPCP

Malicious versions of LiteLLM were backdoored by TeamPCP, targeting millions of developers. This supply chain attack steals sensitive credentials and maintains persistent access. Developers should update to safe versions immediately.

Security Affairs·
HIGHThreat Intel

ClickFix Campaigns - Targeting Windows and macOS Users

Insikt Group has identified five ClickFix campaigns targeting Windows and macOS. These attacks exploit social engineering techniques to execute malicious commands. Organizations must enhance their defenses against this evolving threat.

Recorded Future Blog·