Threat IntelHIGH

LiteLLM Supply Chain Compromise - TeamPCP's Attack Unveiled

Featured image for LiteLLM Supply Chain Compromise - TeamPCP's Attack Unveiled
TMTrend Micro Research
TeamPCPLiteLLMTrivyPythonsupply chain attack
🎯

Basically, a hacker group used a popular software tool to steal sensitive data from many developers.

Quick Summary

The Threat The recent compromise of LiteLLM, a widely-used AI proxy package, has revealed a significant threat in the cybersecurity landscape. Orchestrated by the criminal group TeamPCP, this multi-ecosystem supply chain attack is one of the most sophisticated documented to date. The attack exploited vulnerabilities in developer tooling and targeted LiteLLM, which serves as a gateway to various LLM

The Threat

The recent compromise of LiteLLM, a widely-used AI proxy package, has revealed a significant threat in the cybersecurity landscape. Orchestrated by the criminal group TeamPCP, this multi-ecosystem supply chain attack is one of the most sophisticated documented to date. The attack exploited vulnerabilities in developer tooling and targeted LiteLLM, which serves as a gateway to various LLM providers. This incident not only highlights the risks associated with open-source software but also underscores the potential for credential theft in a connected development environment.

On March 24, 2026, production systems utilizing LiteLLM began experiencing severe issues, including runaway processes and CPU overloads. Investigations revealed that versions 1.82.7 and 1.82.8 of LiteLLM contained malicious code designed to harvest sensitive data such as cloud credentials, SSH keys, and Kubernetes secrets. This three-stage payload enabled attackers to not only steal data but also maintain persistent access through remote code execution.

Who's Behind It

The group behind this attack, TeamPCP, has demonstrated a deep understanding of Python execution models. They have previously compromised security tools like Trivy to escalate their attacks. By leveraging compromised CI/CD pipelines, they published trojanized packages, allowing them to access sensitive information with relative ease. The sophistication of their operations is evident in their ability to adapt their tactics rapidly, ensuring stealth and persistence throughout the attack.

This incident is part of a broader trend where security tools themselves become entry points for attackers. The use of compromised security scanners to facilitate supply chain attacks poses a significant risk to organizations relying on these tools for protection. As seen in this case, when security tools are exploited, they can inadvertently become platforms for credential harvesting, leading to widespread vulnerabilities across various systems.

Tactics & Techniques

The LiteLLM attack involved a well-coordinated effort across multiple platforms, including PyPI, npm, and Docker Hub. The attackers injected malicious code into LiteLLM, which was downloaded millions of times daily. The malicious versions were designed to execute a credential harvesting operation targeting over 50 categories of secrets. This included a lateral movement toolkit for Kubernetes, allowing attackers to compromise entire clusters.

The attack's rapid evolution is particularly notable. Within just 13 minutes, the attackers modified their approach from a targeted code injection to a stealthier method that executed on any Python interpreter startup. This adaptability demonstrates a high level of operational sophistication, allowing them to maximize their impact while minimizing detection risks.

Defensive Measures

In response to the LiteLLM compromise, the open-source community mobilized quickly to mitigate the damage. PyPI removed the compromised versions within hours of the first reports, demonstrating the importance of community vigilance in cybersecurity. BerriAI, the maintainer of LiteLLM, engaged incident response teams to address the breach and assess the impact.

Organizations using LiteLLM and similar tools should review their security practices, particularly regarding CI/CD pipelines and dependency management. Implementing strict access controls, regular audits of third-party packages, and monitoring for unusual activity can help prevent similar incidents in the future. Additionally, fostering a culture of security awareness among developers is crucial in identifying and mitigating potential threats before they escalate.

🔒 Pro insight: Analysis pending for this article.

Original article from

TMTrend Micro Research· Peter Girnus
Read Full Article

Related Pings

HIGHThreat Intel

North Korea-Nexus Threat Actor Compromises Axios NPM Package

A North Korea-linked threat actor has compromised the axios NPM package. This attack affects millions of users and highlights serious supply chain vulnerabilities. Immediate action is required to secure affected systems.

Mandiant Threat Intel·
HIGHThreat Intel

macOS Feature - Prevents ClickFix Compromise Attacks

Apple's latest macOS feature helps prevent ClickFix attacks by alerting users before executing risky commands. This is vital for protecting user data from phishing threats. Stay safe and informed with this new security measure.

SC Media·
HIGHThreat Intel

Supply Chain Attack - Axios npm Package Compromised

A major supply chain attack has compromised the Axios npm package, affecting millions of applications. Users are at risk due to malicious versions published in a short time frame. Immediate action is needed to secure systems and prevent exploitation.

Arctic Wolf Blog·
HIGHThreat Intel

Axios Trojans - Major npm Supply Chain Attack Uncovered

The Axios npm library was compromised in a major supply chain attack, affecting millions of applications. Organizations are urged to audit their dependencies and enhance security measures.

CSO Online·
HIGHThreat Intel

TeamPCP’s Supply Chain Attack - Weaponizing Security Tools

TeamPCP has launched a multi-stage supply chain attack on trusted security tools. This breach has exposed sensitive data from numerous organizations, raising serious security concerns. Organizations must act quickly to secure their infrastructures and protect against further exploitation.

Palo Alto Unit 42·
HIGHThreat Intel

Iran Threatens Major US Tech Firms with Attacks Starting April 1

Iran's IRGC has threatened to attack major US tech firms like Apple and Google starting April 1. This escalation could severely disrupt operations and impact global tech infrastructure. Companies are urged to prepare for potential cyberattacks and physical threats as tensions rise.

Wired Security·