BreachesHIGH

Mercor AI Confirms Data Breach After Lapsus$ Claims Theft of 4TB Data

CSCyber Security News+1 more
Lapsus$Mercor AILiteLLMTeamPCPdata breachsupply chain attackcybersecurity
🎯

Mercor AI, a company that connects job seekers with AI firms, has had a major security problem. A group of hackers called Lapsus$ stole a huge amount of their data, including secret information and user details. This happened because of a weakness in a popular software they used. Now, Mercor is working hard to fix the issue and protect their customers.

Quick Summary

Mercor AI confirms a significant data breach linked to Lapsus$, exposing 4TB of sensitive data, including proprietary source code and user verification information.

Mercor AI has officially confirmed a severe data breach following claims by the notorious Lapsus$ hacking group that they stole 4 terabytes of sensitive company data. The incident, stemming from a recent supply chain attack on the open-source LiteLLM project, has exposed proprietary source code, internal databases, and massive amounts of user-verification data. The hacking collective Lapsus$ has listed Mercor’s platform data for a live auction on the dark web, prompting interested buyers to 'make an offer.' The threat actors claim to have exfiltrated the entirety of the 4-terabyte dataset by breaching the company’s Tailscale VPN. The extensively detailed stolen cache reportedly includes 939GB of platform source code, a 211GB user database, and 3TB of storage buckets containing video interviews and identity verification passports.

In response to the extortion attempts, Mercor AI released a public statement emphasizing that the privacy and security of their customers and contractors remain their foundational priority. The company clarified that the breach was the direct result of a widespread supply chain attack involving the open-source routing library LiteLLM. Mercor’s security team promptly contained the incident and is currently conducting a comprehensive investigation alongside leading third-party forensics experts.

The root cause of Mercor’s breach traces back to late March 2026, when a threat actor known as TeamPCP compromised the PyPI publishing credentials for the LiteLLM library. TeamPCP injected a three-stage malicious backdoor into versions 1.82.7 and 1.82.8, which was designed to harvest credentials and establish persistent system access. Because LiteLLM is widely integrated into AI applications, the malware executed immediately upon installation and impacted thousands of unsuspecting organizations.

Founded in 2023, Mercor operates a highly successful AI recruitment platform that claims over $500 million in revenue and connects specialized domain experts with major AI firms like OpenAI and Anthropic. The startup facilitates over $2 million in daily payouts and now faces significant operational risks due to the exposure of its contractors’ personal information. The leak of internal AI source code and sensitive KYC materials poses severe security implications for both the $10 billion platform and its extensive user base.

Lapsus$ is a well-known cybercrime syndicate with a history of targeting high-profile technology companies using aggressive extortion tactics. The group frequently uses public data leaks and dark web auctions to pressure victims into paying ransoms after initial private negotiations fail. Their involvement in the Mercor AI breach highlights a continuing trend of threat actors exploiting upstream supply chain vulnerabilities to access massive downstream corporate datasets. Notably, this incident has raised concerns among cybersecurity experts about the resilience of supply chain security in the tech industry, emphasizing the need for enhanced protective measures against similar attacks in the future.

The breach underscores the vulnerabilities in supply chain security, particularly for companies relying on open-source software. As Lapsus$ continues to exploit these weaknesses, organizations must prioritize robust security measures and incident response strategies to mitigate risks.

Original article from

CSCyber Security News· Guru Baran
Read Full Article

Also covered by

CYCyber Security News

Mercor AI Confirms Data Breach Following Lapsus$ Claims of 4TB Data Theft

Read Article

Related Pings

HIGHBreaches

Mercor Hit by Cyberattack Linked to LiteLLM Compromise

Mercor has confirmed a cyberattack linked to the LiteLLM project. The extortion group Lapsus$ claims to have stolen sensitive data. This breach raises serious security concerns for many companies involved.

TechCrunch Security·
HIGHBreaches

Anthropic Exposes Claude Code Source via NPM Leak

Anthropic has leaked its Claude Code source online due to a packaging error. This incident exposes critical internal architecture and could impact user trust. Anthropic is taking steps to prevent future leaks.

Security Affairs·
HIGHBreaches

Lockheed Martin Data Breach - Stolen Data Offered for $600M

Lockheed Martin is in hot water after a massive data breach. Allegedly, hackers have stolen 375 TB of sensitive data and are trying to sell it for nearly $600 million. This breach could have serious implications for national security. Stay tuned for updates as the situation develops.

SC Media·
HIGHBreaches

CareCloud Confirms Breach of EHR Environment Affecting Patients

CareCloud has confirmed a breach affecting its EHR environment, potentially compromising sensitive patient health records. The company is assessing the extent of the data accessed. This incident highlights ongoing vulnerabilities in healthcare data security.

SC Media·
HIGHBreaches

CareCloud Data Breach - Hackers Access Patients' Records and IT Infrastructure

CareCloud has confirmed a data breach involving unauthorized access to its electronic health record systems, raising serious concerns over patient data security and potential exposure.

TechCrunch Security·
HIGHBreaches

Cisco Source Code Stolen - Trivy-Linked Breach Exposed Data

Cisco has suffered a breach linked to the Trivy attack, resulting in stolen source code and AWS keys. This incident affects numerous corporate clients, raising concerns about data security. Immediate actions are being taken to contain the breach and protect sensitive information.

BleepingComputer·