Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks
    Cybersecurity

    LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks

    adminBy adminMarch 25, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A slew of supply chain attacks against popular open source tools and packages appears to have been orchestrated by TeamPCP, a cybercriminal group that rose to prominence in late 2025.

    The latest victim of the group is BerryAI’s popular LiteLLM library, a unified interface that makes it easier for apps to switch between various LLMs: on March 24, TeamPCP uploaded two compromised versions (1.82.7 and 1.82.8) on PyPI that included a credential stealer and a malware dropper.

    Callum McMahon, a research scientist at FutureSearch, was the first to raise the alarm, after he loaded the malicious payload and it caused havoc on his local machine.

    “Because LiteLLM typically sits directly between applications and multiple AI service providers, it often has access to API keys, environment variables, and other sensitive configuration data. Compromising a package in this position allows attackers to intercept and exfiltrate valuable secrets without needing to directly breach upstream systems,” Sonatype researchers noted.

    “Given the package’s place in the AI stack, cybercriminals are looking to take advantage of enterprises leveraging open source to rapidly develop and deploy AI applications. The design of the malware suggests a broad targeting strategy aimed at developers, cloud environments, and modern application infrastructure.”

    The malicious LiteLLM versions have since been removed from PyPI.

    Sonatype advises organizations that installed or executed them to identify and remove the malicious package from affected systems, rotate all potentially exposed credentials (SSH keys, cloud tokens, CI/CD secrets, crypto wallets, etc.), and conduct a thorough investigation to unearth persistence mechanisms and additional payloads dropped during the compromise.

    “In many cases, rebuilding affected systems from a known clean state may be the safest course of action,” they added.

    A series of supply chain attacks

    The compromise of LiteLLM on PyPI was subsequently tied to a compromised maintainer account and malicious workflows pushed by the attackers.

    The attack followed the same playbook that TeamPCP used to compromise Aqua’s Trivy security scanner and related GitHub Actions (automated tasks) on March 19, and CheckMarx’s VS Code extensions/plugins and GitHub Actions on March 23.

    Both companies have outlined actions that affected organizations should take and Aqua has confirmed that the compromise happened due to an incomplete containment/remediation of an earlier supply chain attack.

    “Following the initial disclosure on March 1, credential rotation was performed but was not atomic (not all credentials were revoked simultaneously). The attacker could have used a valid token to exfiltrate newly rotated secrets during the rotation window (which lasted a few days). This could have allowed the attacker to retain access and execute the March 19 attack,” the company explained.

    Finally, TeamPCP is also believed to have compromised a number of NPM packages, which were equipped with a Python backdoor that downloads and executes “whatever it’s told to”, and a self-propagation tool (worm) for spreading the backdoor further to other NPM packages.

    And, according to Aikido researchers, they also deployed a Kubernetes node or local machine wiper when the target is (geo)located in Iran.

    Rami McCarthy, Principal Security Researcher at Wiz, has compiled a timeline of the attacks, which is likely to expand in the coming days.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    attacks Chain Compromised expanding LiteLLM Packages PyPI Supply TeamPCP
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleOpenAI Just Killed Sora | Lifehacker
    Next Article I Found Out How to Easily Accept Przelewy24 Payments in WordPress
    admin
    • Website

    Related Posts

    $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

    April 18, 2026

    Researcher drops two more Microsoft Defender zero-days, all three now exploited in the wild

    April 18, 2026

    CISA flags Apache ActiveMQ flaw as actively exploited in attacks

    April 18, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    AI traffic converts better than non-AI visits for U.S. retailers: Report

    April 18, 2026

    Horizon Lock on the Galaxy S26 Ultra is amazing, but Motorola did it first. Here’s how they compare

    April 18, 2026

    $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

    April 18, 2026

    This hidden Samsung Galaxy S26 feature has changed how I watch Netflix and YouTube on the move

    April 18, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,382)
    • Privacy & Online Earning (171)
    • SEO & Digital Marketing (846)
    • Tech Tools & Mobile / Apps (1,651)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    AI traffic converts better than non-AI visits for U.S. retailers: Report

    April 18, 2026

    Horizon Lock on the Galaxy S26 Ultra is amazing, but Motorola did it first. Here’s how they compare

    April 18, 2026

    $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

    April 18, 2026
    Most Popular
    • AI traffic converts better than non-AI visits for U.S. retailers: Report
    • Horizon Lock on the Galaxy S26 Ultra is amazing, but Motorola did it first. Here’s how they compare
    • $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims
    • This hidden Samsung Galaxy S26 feature has changed how I watch Netflix and YouTube on the move
    • Equinix offering targets automated AI-centric network operations
    • Researcher drops two more Microsoft Defender zero-days, all three now exploited in the wild
    • 5 things Claude’s free tier does better than Gemini, ChatGPT, and Perplexity for productivity users who live in documents
    • CISA flags Apache ActiveMQ flaw as actively exploited in attacks
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.