back to top
HomeMarket AnalysisLiteLLM Supply Chain Attack Steals 300GB Data and 500K Credentials

LiteLLM Supply Chain Attack Steals 300GB Data and 500K Credentials

-

Key Highlights

A serious security breach in LiteLLM has put about 300GB of data and 500,000 user credentials at risk. The problem started when hackers slipped malicious code into PyPI releases 1.82.7 and 1.82.8, allowing anyone who installed them to have sensitive information stolen automatically. 

@media only screen and (min-width: 0px) and (min-height: 0px) {
div[id^=”wrapper-sevio-e0d3bc50-0aae-47cc-a8d7-f0c9a0cef941″] {
width: 320px;
height: 100px;
}
}
@media only screen and (min-width: 1650px) and (min-height: 0px) {
div[id^=”wrapper-sevio-e0d3bc50-0aae-47cc-a8d7-f0c9a0cef941″] {
width: 728px;
height: 90px;
}
}

window.sevioads = window.sevioads || [];
var sevioads_preferences = [];
sevioads_preferences[0] = {};
sevioads_preferences[0].zone = “e0d3bc50-0aae-47cc-a8d7-f0c9a0cef941”;
sevioads_preferences[0].adType = “banner”;
sevioads_preferences[0].inventoryId = “502576df-3ba9-44d6-aa0c-8d4d40954bc3”;
sevioads_preferences[0].accountId = “265767db-939a-4138-8819-ebf4e3d5d360”;
sevioads.push(sevioads_preferences);

SlowMist Technology’s Chief Information Security Officer, 23pds, warned cryptocurrency developers to act fast. He posted, “Please immediately verify, rotate relevant keys and credentials as soon as possible, check logs, access records, and any exposure of sensitive data to avoid severe losses similar to the Trust Wallet incident.”

The attack hit a wide range of sensitive data, including SSH keys, cloud accounts on AWS, GCP, and Azure, Kubernetes setups, Git credentials, environment files, shell histories, encrypted wallets, and database passwords. 

Developer Callum McMahon of FutureSearch discovered the malicious release and reported it to PyPI, while Daniel Hnyk subsequently raised a GitHub issue, bringing it to wider developer attention. The malware could also copy itself, spreading through Kubernetes clusters and leaving behind secret backdoors to maintain access.

@media only screen and (min-width: 0px) and (min-height: 0px) {
div[id^=”wrapper-sevio-bf4b3de1-2d49-4069-adb2-b7d50bdcc555″] {
width: 320px;
height: 100px;
}
}
@media only screen and (min-width: 1650px) and (min-height: 0px) {
div[id^=”wrapper-sevio-bf4b3de1-2d49-4069-adb2-b7d50bdcc555″] {
width: 728px;
height: 90px;
}
}

window.sevioads = window.sevioads || [];
var sevioads_preferences = [];
sevioads_preferences[0] = {};
sevioads_preferences[0].zone = “bf4b3de1-2d49-4069-adb2-b7d50bdcc555”;
sevioads_preferences[0].adType = “banner”;
sevioads_preferences[0].inventoryId = “502576df-3ba9-44d6-aa0c-8d4d40954bc3”;
sevioads_preferences[0].accountId = “265767db-939a-4138-8819-ebf4e3d5d360”;
sevioads.push(sevioads_preferences);

How the malware operates

The malware carried out its attack in three main steps. First, it collected sensitive files from the infected computer. Next, it encrypted the stolen data and sent it to a remote server at https://models.litellm.cloud/. Finally, it tried to move laterally within Kubernetes environments, creating new pods that gave it full access to systems. On top of that, a bug in the malware caused a fork bomb, crashing affected machines and revealing the attack.

Commenting on X, Andrej Karpathy highlighted the danger, saying, “Every time you install any dependency you could be pulling in a poisoned package anywhere deep inside its entire dependency tree…The credentials that do get stolen in each attack can then be used to take over more accounts and compromise more packages.”

Immediate steps for developers

Developers need to check if they installed LiteLLM versions 1.82.7 or 1.82.8. If so, they should remove the affected packages, clear any cached files, and look for hidden backdoors like ~/.config/sysmon/sysmon.py. 

All credentials that might have been exposed should be changed immediately. While PyPI has quarantined the malicious package and maintainers are addressing the issue, this attack highlights just how risky supply chain attacks can be in open-source software.

The LiteLLM breach shows that even widely used software packages can carry serious risks. It highlights the need for developers to carefully manage dependencies and stay alert to potential threats.

Also Read: Dark Web, Tor, Crypto Wallets: Indian Police Begins New Cyber Training

Disclaimer: The information researched and reported by Top Coin Daily is for informational purposes only and is not a substitute for professional financial advice. Investing in crypto assets involves significant risk due to market volatility. Always Do Your Own Research (DYOR) and consult with a qualified Financial Advisor before making any investment decisions.


LEAVE A REPLY

Please enter your comment!
Please enter your name here

LATEST POSTS

Hyperliquid price forms bearish double top, will it crash back to $35?

Hyperliquid price dropped toward $39 as a bearish double top and MACD crossover raised the risk of a correction toward $35 support.

Will Toncoin price drop under $2 as bearish crossover nears confirmation?

Toncoin price slipped toward $2 after failing to hold gains near $2.90, while a bearish MACD crossover signaled rising downside risk.

Solana price climbs toward overbought zone, can buyers push past $100?

Solana price climbed above $96 as spot ETF optimism and recovering network activity fueled bullish momentum toward $100 resistance.

BNB price eyes double bottom pattern breakout, will it move past $700?

BNB price nears the $680 double bottom neckline as Grayscale and VanEck spot ETF speculation boosts bullish sentiment.

Most Popular