News Summary: LiteLLM PyPI Package Compromised in TeamPCP Attack
Threat actor TeamPCP compromised the popular Python library LiteLLM through a supply chain attack targeting its PyPI packages. The breach, confirmed by multiple security firms, utilized a compromised Trivy CI/CD pipeline to inject malicious, credential-stealing code into multiple versions of the software. This security incident immediately impacts developers and organizations using the affected LiteLLM versions, exposing their internal networks to potential backdoors. Security researchers advise immediate audits of development environments to identify and remediate the compromised packages.

Key Points
- Outcome: Malicious code was injected into the LiteLLM PyPI package, creating a functional backdoor.
- Action: Attackers exploited a Trivy CI/CD system compromise to deliver a multi-stage credential stealer.
- Impact: The compromised Python library covertly steals credentials and authentication tokens from infected host machines.
- Why it matters: LiteLLM is a highly utilized library, meaning the blast radius of this supply chain attack affects numerous downstream applications.
What Happened
TeamPCP initiated a targeted supply chain attack by compromising the continuous integration and continuous deployment infrastructure used by the LiteLLM project. Specifically, the attackers leveraged a weakness or misconfiguration in Trivy to inject malicious payloads directly into the official LiteLLM PyPI releases. Once these infected packages are downloaded and installed by developers via standard package managers, the trojanized code establishes a backdoor on the host system.

The deployed malicious code operates as a multi-stage stealer. Upon execution, it systematically searches the developer's environment for sensitive data, prioritizing authentication tokens, API keys, and system credentials. This harvested data is subsequently exfiltrated to external command and control servers operated by TeamPCP.
Key Developments
Multiple cybersecurity firms, including Wiz, Sonatype, and BleepingComputer, have independently verified the presence of the trojanized code within the package registry. The current attack has been explicitly linked to a continuation of previous malicious campaigns orchestrated by the TeamPCP threat group. Analysts note that the LiteLLM package averages over 95,000,000 monthly downloads, substantially amplifying the severity and potential reach of the incident.
The compromised litellm PyPI package delivers a multi-stage credential stealer.
Why This Matters
Python developers frequently rely on utility libraries like LiteLLM to interface with various Large Language Models and AI frameworks. When a foundational, highly trusted tool is backdoored, every subsequent application built upon the compromised version inherits the vulnerability. Supply chain attacks of this nature successfully bypass traditional network perimeter defenses because the malicious code is actively retrieved from a trusted source, in this case, the official Python Package Index.

This event highlights the critical necessity for robust dependency verification and secure CI/CD practices in open-source software development. For organizations operating without strict dependency pinning and code auditing, this compromise serves as a severe wake-up call.
What Happens Next
Cybersecurity agencies and open-source registry maintainers are actively working to identify, flag, and pull all infected versions of the package from the PyPI registry. Network administrators and developers are required to immediately scan their environments, forcefully rotate any potentially compromised infrastructure credentials, and deploy updated, verified clean versions of LiteLLM once the project maintainers release secured patches.
Key Terms
- PyPI
- The Python Package Index, the official third-party software repository for the Python programming language.
- Supply Chain Attack
- A cyberattack that seeks to damage an organization by targeting less-secure elements in the supply chain, such as third-party software dependencies or CI/CD pipelines.
- CI/CD
- Continuous Integration and Continuous Deployment, an automated method to frequently deliver software updates to users.
- TeamPCP
- A recognized threat actor group associated with executing complex software supply chain compromises.
FAQ
What is the LiteLLM supply chain attack?
Threat actors injected malicious code into the LiteLLM Python package via a compromised CI/CD pipeline. This code acts as a backdoor to steal credentials and authentication tokens from machines where the package is installed.
Who is responsible for the LiteLLM compromise?
Security researchers have attributed the attack to a threat actor group known as TeamPCP. The group utilized a Trivy CI/CD pipeline compromise to execute the package trojanization.
How does the malicious code affect developers?
The infected Python package functions as a multi-stage credential stealer. It silently harvests sensitive data, including API keys and auth tokens, from the host machine and transmits it to the attackers.
What should developers using LiteLLM do?
Developers must immediately audit their application environments for the compromised versions. It is critical to rotate all potentially exposed credentials and upgrade to a secure, verified release of the library.
Resources
Sources and references cited in this article.


