Popular LiteLLM PyPI package compromised in TeamPCP supply chain attack
嗯,用户让我总结这篇文章,控制在100字以内,而且不需要用“文章内容总结”这样的开头。首先,我得通读整篇文章,抓住主要信息。 文章讲的是TeamPCP黑客组织攻击了LiteLLM这个Python包,导致大量数据泄露。LiteLLM在PyPI上很受欢迎,下载量很高。黑客发布了两个恶意版本,植入了窃取信息的代码。攻击影响了超过50万设备,窃取了各种敏感数据,包括SSH密钥、云令牌、Kubernetes秘密等。 接下来,我需要把这些关键点浓缩到100字以内。重点包括:黑客组织、攻击目标、影响范围、窃取的数据类型以及建议的应对措施。 可能的结构是:黑客组织攻击 LiteLLM 包,导致数据泄露,影响超过50万设备,窃取多种敏感数据。建议用户检查版本并轮换凭证。 最后检查一下字数是否符合要求,并确保表达清晰简洁。 </think> TeamPCP黑客组织通过攻击LiteLLM Python包植入恶意代码,导致超50万台设备数据泄露。恶意版本从PyPI下架,建议用户检查安装并立即轮换所有密钥和凭证以防止进一步损失。 2026-3-24 22:30:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

LiteLLM

The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package on PyPI and claiming to have stolen data from hundreds of thousands of devices during the attack.

LiteLLM is an open-source Python library that serves as a gateway to multiple large language model (LLM) providers via a single API. The package is very popular, with over 3.4 million downloads a day and over 95 million in the past month.

According to research by Endor Labs, threat actors compromised the project and published malicious versions of LiteLLM 1.82.7 and 1.82.8 to PyPI today that deploy an infostealer that harvests a wide range of sensitive data.

The attack has been claimed by TeamPCP, a hacking group that was behind the recent high-profile breach of Aqua Security's Trivy vulnerability scanner. That breach is believed to have led to cascading compromises that impacted Aqua Security Docker images, Checkmarx KICS project, and now LiteLLM.

The group has also been found targeting Kubernetes clusters with a malicious script that wipes all machines when it detects systems configured for Iran. Otherwise, it installs a new CanisterWorm backdoor on devices in other regions.

Sources have told BleepingComputer the number of data exfils is approximately 500,000, with many being duplicates. VX-Underground reports a similar number of 'infected devices."

However, BleepingComputer has not been able to confirm those numbers independently.

LiteLLM supply chain attack

Endor Labs reports that threat actors pushed out two malicious versions of LiteLLM today, each containing a hidden payload that executes when the package is imported.

The malicious code was injected into 'litellm/proxy/proxy_server.py' [VirusTotal] as a base64 encoded payload, which is decoded and executed whenever the module is imported. 

Version 1.82.8 introduces a more aggressive feature that installs a '.pth' file named 'litellm_init.pth' [VirusTotal] to the Python environment. Because Python automatically processes all '.pth' files when the interpreter starts, the malicious code would be executed whenever Python is run, even if LiteLLM is not specifically used.

Once executed, the payload ultimately deploys a variant of the hacker's "TeamPCP Cloud Stealer" and a persistence script. Analysis by BleepingComputer shows the payload contains virtually the same credential-stealing logic used in the Trivy supply chain attack.

"Once triggered, the payload runs a three-stage attack: it harvests credentials (SSH keys, cloud tokens, Kubernetes secrets, crypto wallets, and .env files), attempts lateral movement across Kubernetes clusters by deploying privileged pods to every node, and installs a persistent systemd backdoor that polls for additional binaries," explains Endor Labs.

"Exfiltrated data is encrypted and sent to an attacker-controlled domain."

Infostealer code to steal credentials from infected devices
Infostealer code to steal credentials from infected devices
Source: BleepingComputer

The stealer harvests a wide range of credentials and authentication secrets, including:

  • System reconnaissance by running the hostname, pwd, whoami, uname -a, ip addr, and printenv commands.
  • SSH keys and configuration files
  • Cloud credentials for AWS, GCP, and Azure
  • Kubernetes service account tokens and cluster secrets
  • Environment files such as `.env` variants
  • Database credentials and configuration files
  • TLS private keys and CI/CD secrets
  • Cryptocurrency wallet data

The cloud stealer payload also includes an additional base64 encoded script that is installed as a systemd user service disguised as a "System Telemetry Service," which periodically contacts a remote server at checkmarx[.]zone to download and execute additional payloads.

Installing persistent backdoor
Installing persistent backdoor
Source: BleepingComputer

Stolen data is bundled into an encrypted archive named tpcp.tar.gz and sent to attacker-controlled infrastructure at models.litellm[.]cloud, where the threat actors can access it.

Exfiltrating stolen data stored in tpcp.tar.gz 
Exfiltrating stolen data stored in tpcp.tar.gz 
Source: BleepingComputer

Rotate exposed credentials!

Both malicious LiteLLM versions have been removed from PyPI, with version 1.82.6 now the latest clean release. 

Organizations that use LiteLLM are strongly advised to immediately:

  • Check for installations of versions 1.82.7 or 1.82.8
  • Immediately rotate all secrets, tokens, and credentials used on or found within code on impacted devices.
  • Search for persistence artifacts such as '~/.config/sysmon/sysmon.py' and related systemd services
  • Inspect systems for suspicious files like '/tmp/pglog' and '/tmp/.pg_state'
  • Review Kubernetes clusters for unauthorized pods in the 'kube-system' namespace
  • Monitor outbound traffic to known attacker domains

If compromise is suspected, all credentials on affected systems should be treated as exposed and rotated immediately.

BleepingComputer has repeatedly covered breaches that stemmed from companies not rotating credentials, secrets, and authentication tokens found in previous breaches.

Both researchers and threat actors have told BleepingComputer that while rotating secrets is difficult, it is one of the best ways to prevent cascading supply chain attacks.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/popular-litellm-pypi-package-compromised-in-teampcp-supply-chain-attack/
如有侵权请联系:admin#unsafe.sh