BreachesHIGH

Litellm PyPI Breach - Malicious Code Steals Credentials

TMTrend Micro Research
litellmPyPIcloud credentialsKubernetesSSH keys
🎯

Basically, a popular coding tool got hacked, stealing secret keys from many users.

Quick Summary

A serious breach of the litellm PyPI package has put millions at risk. Malicious code has stolen cloud credentials and Kubernetes secrets. Immediate action is required to secure your systems.

What Happened

The litellm Python package was compromised on the Python Package Index (PyPI). Versions 1.82.7 and 1.82.8 contained malicious code designed to steal cloud credentials, SSH keys, and Kubernetes secrets. If you updated your environment on or after March 24, 2026, you should assume your keys are no longer secure. The breach was discovered when users experienced unexpected crashes due to a bug in the malware that created an endless loop of processes, effectively acting as a fork bomb.

The attackers hijacked maintainer accounts for the litellm project, bypassing standard GitHub protocols to push compromised versions directly to PyPI. Given that litellm is a dependency for numerous AI-related projects, the impact is extensive. With over 3.4 million downloads in just one day, many organizations could be at risk.

Who's Affected

Any organization that uses the litellm package in their software stack is potentially affected. This includes developers working on AI applications, as litellm serves as a bridge to various major LLM endpoints. The scale of the breach is staggering, with millions of downloads making it likely that many teams have integrated this package into their environments. If your engineering team builds anything related to AI, it’s almost certain that litellm is part of your codebase.

What Data Was Exposed

The malicious versions of litellm are specifically designed to extract sensitive information. This includes:

  • Cloud credentials: Secrets for AWS, GCP, and Azure services.
  • SSH keys: These can provide unauthorized access to servers.
  • Kubernetes secrets: The malware can escalate privileges and take over entire clusters if it detects service account tokens.

Once compromised, the malware can execute commands that lead to data encryption and exfiltration to attacker-controlled servers, significantly increasing the risk of data breaches.

What You Should Do

If you suspect that your environment has been compromised, take immediate action:

  1. Purge the environment: Search for and remove any instances of litellm, especially files like litellm_init.pth.
  2. Rotate credentials: Change all SSH keys, cloud provider credentials, and database passwords immediately.
  3. Audit your Kubernetes clusters: Look for any suspicious activity or unauthorized pods.
  4. Block outbound traffic: Prevent any connections to known malicious domains associated with the attack.

Don't wait for a vendor alert; act now to mitigate the damage. Security is a shared responsibility, and proactive measures are essential to safeguard your infrastructure.

🔒 Pro insight: This incident underscores the critical need for stringent dependency management and proactive credential rotation in CI/CD pipelines.

Original article from

Trend Micro Research · Fernando Tucci

Read Full Article

Related Pings

HIGHBreaches

Data Breach - Internet Yiff Machine Hacks Crime Tips Database

A major data breach has occurred at P3 Global Intel, revealing sensitive information from crime tips. This affects many individuals, including those involved in school safety. Authorities are urging caution as they investigate the breach.

Ars Technica Security·
HIGHBreaches

Ajax Football Club Hack - Exposed Fan Data and Ticket Hijack

AFC Ajax has reported a hack exposing fan data and enabling ticket hijacking. Hundreds of fans are affected, raising concerns about data security. The club is taking steps to enhance its systems and protect user information.

BleepingComputer·
HIGHBreaches

Hightower Holding Data Breach - 130,000 Affected Individuals

Hightower Holding has reported a data breach affecting over 130,000 individuals. Hackers stole sensitive personal information, including Social Security numbers. The company is offering credit monitoring services to help mitigate risks for those impacted.

SecurityWeek·
HIGHBreaches

Data Breach - Russian Authorities Arrest LeakBase Admin

Russian authorities arrested the alleged admin of LeakBase, a major marketplace for stolen data. This operation reveals the ongoing threat of data breaches and identity theft. With international cooperation, law enforcement aims to disrupt cybercrime networks and protect individuals from fraud.

Security Affairs·
MEDIUMBreaches

Infinite Campus - Reports Hack After ShinyHunters Attempt

Infinite Campus has reported a data breach due to a ShinyHunters extortion attempt. Names and contact details of school staff were accessed. This incident highlights ongoing security risks in the education sector.

SC Media·
HIGHBreaches

Data Breach - HackerOne Employees Compromised in Attack

A serious data breach has compromised HackerOne employees' personal information due to a hack at Navia Benefit Solutions. Nearly 300 employees are affected, raising concerns about identity theft and fraud. Vigilance is crucial as the situation develops.

SC Media·