Massive Data Breach: TeamPCP Compromises Popular Python Package LiteLLM!
The cybersecurity world is in shock as the notorious TeamPCP threat actor has compromised two versions of the widely-used Python package, LiteLLM. These compromised versions contain a credential harvester and a persistent backdoor.
TeamPCP Compromises LiteLLM Python Package: Credential Harvester and Backdoor Injected
A concerning development has emerged in the cybersecurity landscape. The threat actor known as TeamPCP, previously implicated in attacks on Trivy and KICS, has successfully compromised the popular Python package LiteLLM.
Attack Details
The attackers injected two malicious versions into LiteLLM's versions 1.82.7 and 1.82.8. These compromised versions include the following dangerous functionalities:
- Credential Harvester: A tool designed to steal users' sensitive credentials.
- Kubernetes Lateral Movement Toolkit: Provides capabilities for unauthorized access and propagation within Kubernetes environments.
- Persistent Backdoor: Allows for long-term covert access to systems.
This attack is strongly suspected to have been carried out via a compromise of the Trivy CI/CD pipeline, raising significant concerns about software supply chain security.
Has your email been leaked? Check for free — results in seconds.
Check Now →Affected Users and Recommended Actions
Developers and organizations utilizing the LiteLLM package are strongly urged to update to the latest secure versions and to scan their systems for potential threats. Promptly patching vulnerabilities and removing any malicious software is a critical necessity.
Source: https://thehackernews.com/2026/03/teampcp-backdoors-litellm-versions.html