Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Supply Chain Attack: Malicious PyPI Packages

0
Medium
Published: Wed Mar 25 2026 (03/25/2026, 10:38:33 UTC)
Source: AlienVault OTX General

Description

TeamPCP has launched a supply chain attack targeting LiteLLM, an open-source Python library used in 36% of cloud environments. Malicious versions 1.82.7 and 1.82.8 were published on PyPI, employing sophisticated techniques for payload delivery and persistence. The compromised packages exploit Python's .pth mechanism for stealthy execution across any Python process. The malware collects sensitive data including API keys, cloud credentials, and CI/CD secrets, encrypting and exfiltrating them to attacker-controlled domains. This attack follows TeamPCP's previous compromises of Aqua Security's Trivy and Checkmarx tools, highlighting an ongoing campaign against the open-source ecosystem. The incident underscores the potential for widespread impact and the need for vigilance in software supply chain security.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 14:46:33 UTC

Technical Analysis

The threat actor TeamPCP has executed a sophisticated supply chain attack targeting LiteLLM, an open-source Python library integrated into approximately 36% of cloud environments. The attackers published malicious versions 1.82.7 and 1.82.8 on the Python Package Index (PyPI), embedding malware that exploits Python's .pth file mechanism. This mechanism allows code to be executed automatically whenever any Python process starts, enabling stealthy and persistent execution across environments using the compromised package. The malware is designed to harvest sensitive data including API keys, cloud service credentials, and continuous integration/continuous deployment (CI/CD) secrets. These stolen credentials are encrypted and exfiltrated to attacker-controlled domains such as checkmarx.zone and models.litellm.cloud, facilitating further compromise. This incident is part of a broader campaign by TeamPCP, which previously compromised other open-source security tools like Aqua Security's Trivy and Checkmarx, demonstrating a targeted effort against the open-source ecosystem. The attack leverages multiple tactics including supply chain compromise (T1195), persistence via .pth files (T1574.008), credential access (T1555), and data exfiltration (T1041). Although no confirmed exploits in the wild have been reported, the attack's sophistication and the widespread use of LiteLLM pose a significant threat to cloud security.

Potential Impact

The impact of this supply chain attack is potentially severe for organizations using LiteLLM in their cloud environments. By compromising a widely used open-source library, attackers gain a stealthy foothold that can execute malicious code across any Python process, making detection difficult. The theft of API keys, cloud credentials, and CI/CD secrets can lead to unauthorized access to cloud resources, data breaches, and disruption of development pipelines. This can result in loss of sensitive data, intellectual property theft, service outages, and reputational damage. Given the integration of LiteLLM in 36% of cloud environments, the scope of affected systems is broad, increasing the risk of large-scale compromise. The attack also highlights the vulnerability of open-source supply chains, which are critical to modern software development and cloud infrastructure. Organizations may face regulatory and compliance consequences if sensitive data is exposed due to this compromise.

Mitigation Recommendations

Organizations should immediately audit their use of LiteLLM, specifically checking for versions 1.82.7 and 1.82.8, and revert to known safe versions or remove the package if possible. Implement strict package integrity verification using cryptographic signatures or hashes before deployment. Employ runtime monitoring to detect unusual Python process behaviors, especially those involving .pth files or unexpected network connections to suspicious domains like checkmarx.zone or models.litellm.cloud. Rotate all potentially exposed credentials, including API keys and cloud secrets, and enforce least privilege access to limit damage from compromised credentials. Integrate supply chain security tools that scan dependencies for known malicious packages and anomalies. Enhance CI/CD pipeline security by restricting package sources and using allowlists. Educate developers and DevOps teams about supply chain risks and encourage vigilance when updating dependencies. Collaborate with open-source communities to report and remediate compromised packages promptly. Finally, implement network egress filtering to block unauthorized data exfiltration attempts to known malicious domains.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.wiz.io/blog/threes-a-crowd-teampcp-trojanizes-litellm-in-continuation-of-campaign"]
Adversary
TeamPCP
Pulse Id
69c3bb29c62248c6ffd0b50c
Threat Score
null

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttp://checkmarx.zone/raw

Domain

ValueDescriptionCopy
domaincheckmarx.zone
domainmodels.litellm.cloud

Threat ID: 69c3f1aef4197a8e3b553f9b

Added to database: 3/25/2026, 2:31:10 PM

Last enriched: 3/25/2026, 2:46:33 PM

Last updated: 3/26/2026, 5:28:53 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses