BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
CIPHER
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
CIPHERThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /TeamPCP Trojans LiteLLM Package in Supply Chain Attack

TeamPCP Trojans LiteLLM Package in Supply Chain Attack

March 25, 2026Malware & Threats2 min readhigh

Originally reported by Wiz Blog

#supply-chain#python#teampcp#litellm#credential-theft#package-compromise
Share

TL;DR

TeamPCP threat actors compromised the popular LiteLLM Python package, injecting malware into versions 1.82.7 and 1.82.8 that steals cloud credentials and secrets. The attack uses Python's .pth mechanism for stealthy persistence across package installations.

Why high?

Active supply chain attack targeting widely-used AI infrastructure package with credential exfiltration capabilities and novel persistence mechanism.

Campaign Overview

Wiz researchers have identified the latest victim in TeamPCP's ongoing supply chain campaign: LiteLLM, a popular Python package for interfacing with large language model APIs. The threat actors successfully compromised versions 1.82.7 and 1.82.8 of the package, implementing a sophisticated credential harvesting operation.

Technical Analysis

Persistence Mechanism

The malicious versions abuse Python's .pth file mechanism to achieve persistence. This technique allows the malware to execute code automatically whenever Python imports packages, creating a stealthy foothold that survives package updates and system reboots.

Data Exfiltration Targets

The trojanized LiteLLM package specifically targets:

  • Cloud service credentials (AWS, Azure, GCP)
  • CI/CD pipeline secrets
  • API keys and authentication tokens
  • Environment variables containing sensitive data

Exfiltrated data is transmitted to attacker-controlled domains, enabling potential lateral movement and further compromise of affected environments.

Impact Scope

LiteLLM serves as a critical component in many AI and machine learning workflows, particularly in enterprise environments deploying language model integrations. Organizations using the compromised versions face immediate risk of credential theft and potential cloud infrastructure compromise.

Attribution and Campaign Context

This attack represents a continuation of TeamPCP's systematic targeting of open-source Python packages. The group has demonstrated consistent tactics across multiple package compromises, suggesting an organized effort to infiltrate software supply chains at scale.

Mitigation Steps

Organizations should immediately:

  • Audit environments for LiteLLM versions 1.82.7 and 1.82.8
  • Rotate all credentials that may have been exposed on affected systems
  • Implement package integrity verification in CI/CD pipelines
  • Monitor for unauthorized network connections to external domains
  • Review logs for suspicious .pth file creation or modification

Sources

  • Wiz Blog: Three's a Crowd: TeamPCP trojanizes LiteLLM in Continuation of Campaign

Originally reported by Wiz Blog

Tags

#supply-chain#python#teampcp#litellm#credential-theft#package-compromise

Related Intelligence

  • Supply Chain Strikes and AI Evasion: March Malware Intelligence Roundup

    highMar 18, 2026
  • GlassWorm Campaign Escalates: 72 Malicious Extensions Weaponize Open VSX Dependencies

    highMar 15, 2026
  • Weekly Threat Roundup: Police Dismantle Massive Cybercrime Infrastructure as New Campaign Targets Enterprise VPNs

    highMar 14, 2026

Related Knowledge

  • CIPHER Deep Training: Malware Analysis, Reverse Engineering, and Evasion Techniques

    offensive
  • Malware Analysis Deep Dive — CIPHER Training Module

    dfir
  • DFIR & Threat Hunting Deep Training — CIPHER Knowledge Base

    dfir

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Academic Study Reveals How Security Fatigue Undermines Digital Defense Postures

Next Article

TeamPCP Supply Chain Attacks Escalate with LiteLLM Compromise, Tax Season Malvertising Campaign Targets EDR→