Overview

TeamPCP, the threat actor behind the recent compromises of Trivy and KICS, has now compromised a popular Python package named litellm, pushing two malicious versions containing a credential harvester, a Kubernetes lateral movement toolkit, and a persistent backdoor. Multiple security vendors, including Endor Labs and JFrog, revealed that litellm versions 1.82.7 and 1.82.8 were published on March

Organisations Involved

The following organisations are mentioned in relation to this incident: Endor Labs.

Multi-Source Coverage

This event has been reported across multiple outlets:


Sources: thehackernews. Aggregated by Cybernews Agency pipeline.