Malware & RansomwareHIGH

Malware - TeamPCP Trojanizes LiteLLM in New Attack Campaign

WIWiz Blog
πŸ“° 5 sourcesΒ·Summary by CyberPings EditorialΒ·AI-assistedΒ·Reviewed by Rohit Rana
Updated:
🎯

Basically, a group of hackers added bad code to a popular software tool to steal sensitive information.

Quick Summary

TeamPCP has struck again, compromising LiteLLM with malicious packages. Users of this popular tool are at risk of losing sensitive cloud credentials. Immediate action is needed to secure environments and prevent data theft.

What Happened

LiteLLM, a widely used open-source Python library, has fallen victim to a malicious attack by TeamPCP. This library, which translates API requests for various Large Language Models, is present in 36% of cloud environments, making its compromise particularly concerning. On March 24, 2026, malicious versions 1.82.7 and 1.82.8 were published on PyPI, exploiting vulnerabilities to deliver harmful payloads. These packages were quickly quarantined, but not before they could impact numerous users.

The attack utilized Python's .pth file mechanism to execute arbitrary code during the interpreter's initialization. This stealthy method allowed the malware to run without direct invocation of LiteLLM, making detection challenging. By the time the packages were removed, they had already begun exfiltrating sensitive data from affected systems.

Who's Being Targeted

The primary targets of this malware are organizations utilizing LiteLLM in their cloud environments. Given its prevalence, the impact is potentially widespread. The malicious payload is designed to collect sensitive information, including cloud credentials, SSH keys, and CI/CD secrets. This data is crucial for maintaining security in cloud infrastructures, and its theft can lead to severe security breaches.

Organizations that rely on LiteLLM for API translation are particularly vulnerable. The rapid deployment of these malicious packages means that many users may not have had the chance to secure their environments before the attack took place.

Signs of Infection

Indicators of infection include unexpected behavior in Python environments where LiteLLM is used. If users notice unusual API requests or unauthorized access to cloud services, it may be a sign that the malware is active. The malicious versions of LiteLLM execute a double base64-encoded payload, which can lead to data exfiltration without detection.

Furthermore, the malware collects various sensitive data types, including environment variables and database credentials. This extensive data collection mimics previous attacks seen in the KICS operation, indicating a pattern in TeamPCP's tactics.

How to Protect Yourself

To mitigate the risks associated with this malware, users should immediately check for the presence of the malicious LiteLLM versions in their environments. Monitoring tools like the Wiz Threat Center can provide guidance on identifying compromised packages and assessing the potential impact. Users are encouraged to:

  • Regularly audit their Python packages and dependencies.
  • Implement strict access controls for sensitive cloud resources.
  • Stay informed about updates and advisories from trusted sources regarding open-source software vulnerabilities.

By taking these proactive steps, organizations can better protect themselves against similar attacks in the future. Vigilance and prompt action are essential in the fight against evolving malware threats.

πŸ”’ Pro insight: The use of Python's .pth file for persistence highlights a growing trend in supply chain attacks targeting open-source software.

Original article from

WIWiz Blog
Read Full Article

Also covered by

THThe Hacker News

TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise

Read Article
SESecurity Affairs

Malicious LiteLLM versions linked to TeamPCP supply chain attack

Read Article
CSCSO Online

PyPI warns developers after LiteLLM malware found stealing cloud and CI/CD credentials

Read Article
TETechCrunch Security

Mercor says it was hit by cyberattack tied to compromise of open-source LiteLLM project

Read Article

Related Pings

HIGHMalware & Ransomware

Malware Newsletter Round 91 - Latest Threats and Insights

The latest malware newsletter reveals new threats like Infiniti Stealer and npm supply chain attacks. Developers and organizations must stay alert to evolving risks in cybersecurity.

Security AffairsΒ·
HIGHMalware & Ransomware

Malicious Email Delivers CMD Malware - Privilege Escalation Alert

A malicious email has delivered a .cmd malware file that escalates privileges and bypasses antivirus systems. Users are at risk of significant system compromise. Awareness and immediate action are vital to mitigate this threat.

Security AffairsΒ·
HIGHMalware & Ransomware

Axios NPM Package Compromised - Supply Chain Attack Exposed

A major supply chain attack compromised the Axios NPM package, affecting millions of users. Malicious versions deployed a RAT, posing serious security risks. Swift action was taken to remove the threats.

Trend Micro ResearchΒ·
HIGHMalware & Ransomware

Brokk Hacked - Play Ransomware Exposes Sensitive Data

Brokk has reportedly been hacked by Play ransomware, leading to the leak of sensitive corporate data. This incident could severely impact the company's reputation and security. Organizations must bolster their defenses to prevent similar breaches.

SC MediaΒ·
HIGHMalware & Ransomware

Chaos Malware - New Targeting of 64-bit Linux Servers

Chaos malware has evolved to target 64-bit Linux servers, expanding its attack surface. This shift raises alarms for organizations relying on these systems. Enhanced security measures are now crucial to protect against potential larger-scale attacks.

SC MediaΒ·
HIGHMalware & Ransomware

Phorpiex Botnet - Spreading Ransomware and Sextortion Tactics

The notorious Phorpiex botnet is back, spreading ransomware and sextortion schemes. Millions are at risk as it targets users globally. Stay alert and protect your devices from this evolving threat.

Cyber Security NewsΒ·