Supply chain attack hits widely-used AI package, risks impacting thousands of companies
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章,抓住关键点。 文章主要讲的是LiteLLM这个开源Python包被黑客入侵,导致供应链攻击。受影响的版本是1.82.7和1.82.8,上传到PyPI后被下载到开发和云环境中。黑客在包中植入了恶意代码,窃取敏感数据,如云凭证、API密钥和加密钱包。攻击者可能通过控制维护者账户上传恶意包。 事件影响广泛,可能波及数万家企业环境。安全专家指出,开源软件供应链的安全问题日益严重。此外,文章提到TeamPCP团伙声称对此负责,并计划继续攻击其他开源项目。 总结时要包括:LiteLLM被黑、恶意代码功能、影响范围、供应链安全问题以及背后的团伙信息。确保在100字以内,用简洁的语言表达清楚。 </think> LiteLLM开源Python包遭黑客供应链攻击,恶意版本植入窃取敏感数据代码,影响数万家企业环境。事件凸显开源软件供应链安全风险。 2026-3-25 17:15:47 Author: therecord.media(查看原文) 阅读量:8 收藏

LiteLLM, an open-source Python package widely used by artificial intelligence systems, has been compromised by hackers in a supply chain attack that researchers say could impact tens of thousands of corporate environments.

Compromised versions of the package (identified as 1.82.7 and 1.82.8) were published on the Python Package Index on Tuesday and unwittingly downloaded into development and cloud environments, according to security researchers.

Experts at Sonatype said the compromised packages were available for at least two hours on March 24, adding that “given the package’s three million daily downloads” the hackers could have reached a “significant” number of victims during that time.

The incident highlights growing concerns over the security of the open-source software supply chain, where widely-used tools maintained by small teams can provide a gateway into thousands of organizations if compromised.

Last year, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and software company Red Hat issued an urgent alert about a backdoor embedded in the XZ Utils tool.

Similar attacks, including the Shai Hulud worm, have seen attackers target software dependencies trusted by developers in order to scale their intrusions far beyond a single victim, embedding malicious code deep inside corporate systems.

In the liteLLM incident, the hackers introduced malicious code to the legitimate software package. How they managed to do so is unclear, although researchers say compromising a maintainer’s account is the most likely as the malicious versions were uploaded using valid publishing access.

The manipulated packages contained malicious code designed to extract sensitive data — including cloud credentials, API keys and cryptocurrency wallets — and maintain access by installing a persistent downloader allowing the attackers to gain deeper access and carry out follow-on intrusions.

Adam Reynolds, senior security researcher at Sonatype, said his team identified some unusual behaviours from the malware, including that it only reaches out to its command endpoint every 50 minutes.

That long delay could help evade sandbox environments that typically execute samples for shorter periods, or it could function as a heartbeat mechanism allowing the operators to distinguish real targets from researchers attempting to probe their infrastructure.

“In some cases the response from the server only contained a link to a song hosted on YouTube, which reinforces the idea that payload delivery is being selectively controlled,” said Reynolds.

It is not known how many organizations have been impacted by the incident, but Wiz Research estimated the package was present in roughly 36% of all cloud environments. Users have been warned to treat any credentials exposed in affected environments as potentially compromised.

Wiz researchers say the incident is part of a broader campaign claimed by a group calling itself TeamPCP, which uses a public Telegram channel to propagandize and solicit business from other cybercriminals.

“This isn’t just credential theft,” said Ben Read, director of strategic threat intelligence at Wiz. “By moving across widely used tools, they are creating a ‘snowball effect’ that enables further compromise.”

TeamPCP has previously claimed responsibility for an attack affecting Aqua Security’s Trivy vulnerability scanner — an incident confirmed by the company — and claims to be working with several other cybercriminal organizations, although this has not yet been confirmed.

The group said it intends to continue targeting widely-used open-source projects, although its claims could not be verified and such groups often overstate their successes.

A Telegram account claiming to be the group’s new leader said on Wednesday it was “actively sorting through the credential sets, this is an astronomical amount even for the man power and operational capacity between the teams, it will all be worth it though.”

While there have been no publicly-confirmed reports of widespread exploitation tied to the liteLLM incident, security experts warned that the downstream risks could be significant if stolen credentials are reused in subsequent attacks.

“For most individuals, the immediate risk is low unless they directly installed the affected versions,” said Reynolds. “This is first and foremost a supply chain compromise targeting developers, organizations, and technical environments using litellm. However, the downstream impact is where things get more serious.

“If organizations were compromised, the individuals whose data they hold could absolutely be affected. Because the malware targets such a broad range of credentials and litellm is widely used, this creates the potential for second- and third-order effects that may ripple outward over time, leading to further breaches, service disruptions, or misuse of sensitive data well beyond the initial point of compromise,” said Reynolds.

“This isn’t an isolated incident; it’s a systemic campaign,” Read said. “It will likely continue.”

Additional reporting by Jonathan Greig.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and a fellow at the European Cyber Conflict Research Initiative, now Virtual Routes. He can be reached securely using Signal on: AlexanderMartin.79


文章来源: https://therecord.media/supply-chain-attack-hits-widely-used-ai-package
如有侵权请联系:admin#unsafe.sh