Malware & RansomwareHIGH

Malware - TeamPCP Trojanizes LiteLLM in New Attack Campaign

WIWiz Blog
LiteLLMTeamPCPmalicious packagesPythoncloud credentials
🎯

Basically, a group of hackers added bad code to a popular software tool to steal sensitive information.

Quick Summary

TeamPCP has struck again, compromising LiteLLM with malicious packages. Users of this popular tool are at risk of losing sensitive cloud credentials. Immediate action is needed to secure environments and prevent data theft.

What Happened

LiteLLM, a widely used open-source Python library, has fallen victim to a malicious attack by TeamPCP. This library, which translates API requests for various Large Language Models, is present in 36% of cloud environments, making its compromise particularly concerning. On March 24, 2026, malicious versions 1.82.7 and 1.82.8 were published on PyPI, exploiting vulnerabilities to deliver harmful payloads. These packages were quickly quarantined, but not before they could impact numerous users.

The attack utilized Python's .pth file mechanism to execute arbitrary code during the interpreter's initialization. This stealthy method allowed the malware to run without direct invocation of LiteLLM, making detection challenging. By the time the packages were removed, they had already begun exfiltrating sensitive data from affected systems.

Who's Being Targeted

The primary targets of this malware are organizations utilizing LiteLLM in their cloud environments. Given its prevalence, the impact is potentially widespread. The malicious payload is designed to collect sensitive information, including cloud credentials, SSH keys, and CI/CD secrets. This data is crucial for maintaining security in cloud infrastructures, and its theft can lead to severe security breaches.

Organizations that rely on LiteLLM for API translation are particularly vulnerable. The rapid deployment of these malicious packages means that many users may not have had the chance to secure their environments before the attack took place.

Signs of Infection

Indicators of infection include unexpected behavior in Python environments where LiteLLM is used. If users notice unusual API requests or unauthorized access to cloud services, it may be a sign that the malware is active. The malicious versions of LiteLLM execute a double base64-encoded payload, which can lead to data exfiltration without detection.

Furthermore, the malware collects various sensitive data types, including environment variables and database credentials. This extensive data collection mimics previous attacks seen in the KICS operation, indicating a pattern in TeamPCP's tactics.

How to Protect Yourself

To mitigate the risks associated with this malware, users should immediately check for the presence of the malicious LiteLLM versions in their environments. Monitoring tools like the Wiz Threat Center can provide guidance on identifying compromised packages and assessing the potential impact. Users are encouraged to:

  • Regularly audit their Python packages and dependencies.
  • Implement strict access controls for sensitive cloud resources.
  • Stay informed about updates and advisories from trusted sources regarding open-source software vulnerabilities.

By taking these proactive steps, organizations can better protect themselves against similar attacks in the future. Vigilance and prompt action are essential in the fight against evolving malware threats.

🔒 Pro insight: The use of Python's .pth file for persistence highlights a growing trend in supply chain attacks targeting open-source software.

Original article from

Wiz Blog

Read Full Article

Related Pings

HIGHMalware & Ransomware

Malware - TeamPCP Backdoors LiteLLM Versions via Trivy Compromise

TeamPCP has backdoored LiteLLM versions 1.82.7 and 1.82.8, embedding malware that steals credentials. This poses a significant risk to users and their environments. Immediate action is required to mitigate the threat.

The Hacker News·
HIGHMalware & Ransomware

Ransomware - How Huntress SOC Stopped a VPN Attack

A small business nearly fell victim to a ransomware attack via an unsecured VPN. Huntress SOC stepped in just in time, showcasing the vital role of human expertise in cybersecurity. This incident serves as a wake-up call for businesses to enhance their security measures and protect against potential threats.

Huntress Blog·
HIGHMalware & Ransomware

Malware - Tax Search Leads to Kernel-Mode AV/EDR Kill

A new malvertising campaign exploits tax season searches to deliver malware that disables antivirus tools. Targeting U.S. users, this attack risks credential theft and system compromise. Stay vigilant and verify sources before downloading any files.

Huntress Blog·
HIGHMalware & Ransomware

Malware - Illicit VS Code Projects Deploy StoatWaffle

North Korean hackers are using fake VS Code projects to spread StoatWaffle malware. This malware can steal sensitive data from developers. It's crucial to recognize the signs and protect yourself from such attacks.

SC Media·
HIGHMalware & Ransomware

Malware - Huntress Stops MacSync Infostealer Attack

Huntress recently thwarted a MacSync infostealer attack on macOS devices, preventing the theft of sensitive data. This incident highlights the need for robust security measures to protect against evolving threats.

Huntress Blog·
HIGHMalware & Ransomware

Malware - Tax Search Ads Deliver ScreenConnect Threat

A new malvertising campaign targets tax document searches, delivering malware that disables security tools. Users are at risk of serious breaches. Stay informed and protect your devices.

The Hacker News·