radar

ONE Sentinel

securitySecurity/THREATS/CRIT

TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise

sourceThe Hacker News
calendar_todayMarch 24, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

TeamPCP Backdoors LiteLLM via Trivy CI/CD Compromise

Summary

The article discusses the compromise of the Python package litellm by the threat actor TeamPCP. Versions 1.82.7 and 1.82.8 of litellm were backdoored, likely through a Trivy CI/CD pipeline compromise, to include malicious components.

Key Points

  • TeamPCP is responsible for compromising the litellm package.
  • Malicious versions 1.82.7 and 1.82.8 of litellm were released.
  • The compromised package includes a credential harvester, a Kubernetes lateral movement toolkit, and a persistent backdoor.
  • The compromise likely occurred through a Trivy CI/CD pipeline.
  • Security vendors Endor Labs and JFrog identified the malicious activity.

Analysis

This incident highlights the risks associated with supply chain attacks on software development pipelines. The inclusion of a credential harvester and Kubernetes toolkit in a popular Python package like litellm poses significant security threats to organizations using these versions. The compromise of the CI/CD pipeline underscores the need for robust security measures in software development processes.

Conclusion

IT professionals should immediately audit their systems for the presence of litellm versions 1.82.7 and 1.82.8 and replace them with secure versions. Strengthening CI/CD pipeline security and monitoring for unusual activity is crucial to prevent similar incidents.