News Summary: LiteLLM PyPI Package Compromised in TeamPCP Attack

The popular Python library LiteLLM has been compromised in a supply chain attack by the threat actor TeamPCP. Utilizing a compromised Trivy CI/CD pipeline, attackers injected a multi-stage credential stealer into the package, affecting potentially millions of users.

News Summary: LiteLLM PyPI Package Compromised in Hack
Last UpdateMar 25, 2026, 6:21:56 PM
ago
📢Advertisement

News Summary: LiteLLM PyPI Package Compromised in TeamPCP Attack

Threat actor TeamPCP compromised the popular Python library LiteLLM through a supply chain attack targeting its PyPI packages. The breach, confirmed by multiple security firms, utilized a compromised Trivy CI/CD pipeline to inject malicious, credential-stealing code into multiple versions of the software. This security incident immediately impacts developers and organizations using the affected LiteLLM versions, exposing their internal networks to potential backdoors. Security researchers advise immediate audits of development environments to identify and remediate the compromised packages.

Graphic illustrating the TeamPCP supply chain threat
Security alert graphic detailing the TeamPCP supply chain campaign.

Key Points

  • Outcome: Malicious code was injected into the LiteLLM PyPI package, creating a functional backdoor.
  • Action: Attackers exploited a Trivy CI/CD system compromise to deliver a multi-stage credential stealer.
  • Impact: The compromised Python library covertly steals credentials and authentication tokens from infected host machines.
  • Why it matters: LiteLLM is a highly utilized library, meaning the blast radius of this supply chain attack affects numerous downstream applications.

What Happened

TeamPCP initiated a targeted supply chain attack by compromising the continuous integration and continuous deployment infrastructure used by the LiteLLM project. Specifically, the attackers leveraged a weakness or misconfiguration in Trivy to inject malicious payloads directly into the official LiteLLM PyPI releases. Once these infected packages are downloaded and installed by developers via standard package managers, the trojanized code establishes a backdoor on the host system.

Conceptual image of a compromised system
The attack successfully bypassed standard perimeter defenses by originating from a trusted repository.

The deployed malicious code operates as a multi-stage stealer. Upon execution, it systematically searches the developer's environment for sensitive data, prioritizing authentication tokens, API keys, and system credentials. This harvested data is subsequently exfiltrated to external command and control servers operated by TeamPCP.

Key Developments

Multiple cybersecurity firms, including Wiz, Sonatype, and BleepingComputer, have independently verified the presence of the trojanized code within the package registry. The current attack has been explicitly linked to a continuation of previous malicious campaigns orchestrated by the TeamPCP threat group. Analysts note that the LiteLLM package averages over 95,000,000 monthly downloads, substantially amplifying the severity and potential reach of the incident.

The compromised litellm PyPI package delivers a multi-stage credential stealer.

Sonatype Security Team, Researchers

Why This Matters

Python developers frequently rely on utility libraries like LiteLLM to interface with various Large Language Models and AI frameworks. When a foundational, highly trusted tool is backdoored, every subsequent application built upon the compromised version inherits the vulnerability. Supply chain attacks of this nature successfully bypass traditional network perimeter defenses because the malicious code is actively retrieved from a trusted source, in this case, the official Python Package Index.

LiteLLM logo
The LiteLLM package is widely used by developers integrating large language models.

This event highlights the critical necessity for robust dependency verification and secure CI/CD practices in open-source software development. For organizations operating without strict dependency pinning and code auditing, this compromise serves as a severe wake-up call.

What Happens Next

Cybersecurity agencies and open-source registry maintainers are actively working to identify, flag, and pull all infected versions of the package from the PyPI registry. Network administrators and developers are required to immediately scan their environments, forcefully rotate any potentially compromised infrastructure credentials, and deploy updated, verified clean versions of LiteLLM once the project maintainers release secured patches.

Key Terms

PyPI
The Python Package Index, the official third-party software repository for the Python programming language.
Supply Chain Attack
A cyberattack that seeks to damage an organization by targeting less-secure elements in the supply chain, such as third-party software dependencies or CI/CD pipelines.
CI/CD
Continuous Integration and Continuous Deployment, an automated method to frequently deliver software updates to users.
TeamPCP
A recognized threat actor group associated with executing complex software supply chain compromises.

FAQ

What is the LiteLLM supply chain attack?
Threat actors injected malicious code into the LiteLLM Python package via a compromised CI/CD pipeline. This code acts as a backdoor to steal credentials and authentication tokens from machines where the package is installed.

Who is responsible for the LiteLLM compromise?
Security researchers have attributed the attack to a threat actor group known as TeamPCP. The group utilized a Trivy CI/CD pipeline compromise to execute the package trojanization.

How does the malicious code affect developers?
The infected Python package functions as a multi-stage credential stealer. It silently harvests sensitive data, including API keys and auth tokens, from the host machine and transmits it to the attackers.

What should developers using LiteLLM do?
Developers must immediately audit their application environments for the compromised versions. It is critical to rotate all potentially exposed credentials and upgrade to a secure, verified release of the library.

Technology & Science Desk profile photo

Written by

Technology & Science Desk

Tech, Science & Digital Innovation

Covers technology, AI, gaming, and scientific developments.

TechnologyAIInnovationScienceGaming

📚Resources

Sources and references cited in this article.


Sponsored
Popular Pick
JBL Vibe Beam 2 - True Wireless Noise Cancelling Earbuds - Black

JBL Vibe Beam 2 - True Wireless Noise Cancelling Earbuds - Black

Quality sound just got easier—and more fun. JBL Vibe Beam 2 earbuds feature exciting JBL Pure Bass Sound, plus Active Noise Cancelling and Smart Ambient technology so you decide how much of the outside world you want to hear. Manage hands-free crisp, clear calls with just a tap on the earbuds. Use the JBL Headphones app to customize your sound and Voice Prompts language. Connect seamlessly with up to 8 Bluetooth devices and switch effortlessly from one to another. And with up to 40 hours (with ANC off) of playback time, they’re a great everyday sound companion.

359,363,593,635,936
CA$99.98
💬 359T reviews 📦 2K+ bought
🏆 Best Seller
Amazon Fire TV Stick 4K Max (newest model), streaming device, supports Wi-Fi 6E, free & live TV without cable or satellite

Amazon Fire TV Stick 4K Max (newest model), streaming device, supports Wi-Fi 6E, free & live TV without cable or satellite

Elevate your entertainment experience with a powerful processor for lightning-fast app starts and fluid navigation. | Play Xbox games, no console required – Stream Call of Duty: Black Ops 7, Hogwarts Legacy, Outer Worlds 2, Ninja Gaiden 4, and hundreds of games on your Fire TV Stick 4K Max with Xbox Game Pass via cloud gaming. Xbox Game Pass subscription and compatible controller required. Each sold separately. | Enjoy the show in 4K Ultra HD, with support for Dolby Vision, HDR10+, and immersive Dolby Atmos audio. | Enjoy smoother 4K streaming with Wi-Fi 6E support, even when other devices are connected to your router. | The first-ever streaming stick with Fire TV Ambient Experience lets you display over 2,000 pieces of museum-quality art and photography. | Fire TV Stick 4K Max has 16GB of storage—double that of Fire TV Stick 4K Plus and our other streaming sticks, for even more apps, games and downloads. | Stream more than 1.2 million movies and TV episodes. Watch favourites from Netflix, Prime Video, Disney+, Crave, and more, plus listen to millions of songs. Subscription fees may apply. | Control your TV and connected devices with an upgraded remote that includes voice control, a recents button, and dedicated channel buttons to surf live TV. | Enjoy fluid gameplay and fast-rendering graphics with a lightning-fast processor. Access popular games with an Amazon Luna subscription—no console required.

11,639
CA$64.99
💬 11.6K reviews 📦 5K+ bought