|
Canada-0-LaboratoriesTesting 公司名錄
|
公司新聞:
- Critical supply chain attack hits LiteLLM, exposing AI developers . . .
LiteLLM, a massively popular Python library, was compromised via a supply chain attack, resulting in the delivery of credential-harvesting malware to thousands of AI developers
- Popular LiteLM PyPI package backdoored to steal credentials, auth tokens
The TeamPCP hacking group is on a supply-chain rampage, compromising the popular “LiteLLM” Python package on PyPI and claiming to have stolen data from hundreds of thousands of devices during the attack LiteLLM is a widely-used open-source Python library that provides access to multiple large language model (LLM) providers through a single API With over […]
- Popular LiteLLM PyPI package backdoored to steal credentials, auth . . .
The package is very popular, with over 3 4 million downloads a day and over 95 million in the past month According to research by Endor Labs, threat actors compromised the project and published malicious versions of LiteLLM 1 82 7 and 1 82 8 to PyPI today that deploy an infostealer that harvests a wide range of sensitive data
- litellm: Credential Stealer Hidden in PyPI Wheel - StepSecurity
It is a dependency in a large number of AI application stacks, CI CD pipelines, and production inference services A developer or engineer installing litellm for routine work would have no reason to suspect the package is exfiltrating credentials
- LiteLLM Backdoored by TeamPCP: PyPI Supply Chain Attack (2026)
TeamPCP then used that token to publish backdoored packages directly to PyPI, bypassing GitHub entirely PyPI quarantined the entire project within approximately three hours The damage window was short, but for a package with LiteLLM’s download volume, three hours is enough to reach thousands of environments
- How the LiteLLM Backdoor Actually Worked Under the Hood
Analyze the LiteLLM backdoor mechanics Learn how TeamPCP compromised Trivy CI CD pipelines to inject pth malware into Python packages and steal credentials
- ⚠️ AI Gateway Attack: LiteLLM is Compromised - DEV Community
On March 24, 2026, attackers published backdoored versions of LiteLLM to PyPI The malware harvested cloud credentials, SSH keys, Kubernetes tokens, and pretty much everything else it could find on the host This is the full breakdown of how it happened, step by step
|
|