Netfox
HomeQ&AAnti-ScamNotifications
© 2026 Netfox. All rights reserved.
Terms of ServicePrivacy PolicyAbout UsEditorial Policy
Comment
Technology

litellm 1.82.8 Supply Chain Attack: Forensic Payload Analysis

Galvin Prescott
Galvin Prescott
Mar 25, 20264 min
0
0
0
248
litellm 1.82.8 Supply Chain Attack: Forensic Analysis of the litellm_init.pth Payload

On March 24, 2026, the popular LLM proxy library litellm was compromised via a maintainer account takeover on PyPI. The threat actor, identified as TeamPCP, published versions 1.82.7 and 1.82.8, injecting a highly aggressive credential-stealing payload.

While v1.82.7 relied on a standard import hook within proxy_server.py, v1.82.8 escalated the attack by utilizing a .pth file. This mechanism ensures the payload executes the moment any Python interpreter starts in the compromised environment, regardless of whether litellm is ever imported by the application logic.

The .pth Execution Vector: Bypassing the Import Guard

The primary artifact in v1.82.8 is litellm_init.pth, a 34,628-byte file placed directly in the site-packages/ directory.

Python’s site module processes these path configuration files during interpreter initialization. While typically used for extending sys.path, any line starting with import is executed via exec(). TeamPCP leveraged this by embedding a base64-encoded orchestrator directly into the .pth file.

# Conceptual representation of the litellm_init.pth trigger
import subprocess, base64, sys; exec(base64.b64decode('...'))

This ensures that a data scientist launching a Jupyter notebook, a developer running a pytest suite, or a CI/CD runner executing a simple python --version check all trigger the malware.

Multi-Stage Payload and Encryption Logic

The payload is a triple-nested base64 structure designed to evade static analysis and string matching. Once decoded, the orchestrator performs a systematic sweep of the host filesystem.

The collection logic targets specific high-value artifacts:

  • Cloud Provider Metadata: Hits IMDS endpoints for AWS, GCP, and Azure to harvest temporary identity tokens.

  • Local Secret Stores: Scans ~/.aws/credentials, ~/.kube/config, and ~/.azure/.

  • Infrastructure-as-Code: Targets terraform.tfvars, .env files, and CI/CD configs (.gitlab-ci.yml, Jenkinsfile).

  • SSH & Git: Exfiltrates the entire ~/.ssh/ directory and .git-credentials.

The exfiltration process is not a simple cleartext POST. The malware implements a professional-grade encryption pipeline:

  1. Symmetric Encryption: Collected data is compressed into tpcp.tar.gz and encrypted using AES-256-CBC with a session key generated via openssl rand.

  2. Asymmetric Wrapping: The AES session key is then encrypted with a hardcoded 4096-bit RSA public key using OAEP padding.

  3. Exfiltration: The encrypted bundle is sent via a silent curl POST to https://models.litellm.cloud/—a domain registered on March 23, 2026, to mimic official LiteLLM infrastructure.

Kubernetes Lateral Movement and Persistence

If the payload detects a Kubernetes service account token at /var/run/secrets/kubernetes.io/serviceaccount/token, it attempts to escalate from the pod to the cluster.

The harvester enumerates all nodes and attempts to deploy a privileged pod to every single one. These pods are configured with hostPID: true and hostNetwork: true, mounting the host's root filesystem at /host. This effectively grants the attacker full escape from the containerized environment to the underlying node hardware.

For persistent access, the malware installs a "System Telemetry Service":

  • Path: ~/.config/sysmon/sysmon.py

  • Trigger: A systemd user service (sysmon.service) that polls https://checkmarx.zone/raw every 50 minutes for secondary binaries.

The Trivy Connection and Supply Chain Lineage

This incident is a direct downstream consequence of the compromise of the Trivy security scanner.

LiteLLM’s CI/CD pipeline pulled an unpinned version of Trivy from an apt repository. The compromised Trivy binary exfiltrated the PYPI_PUBLISH token from the GitHub Actions environment. Similar to the Jia Tan approach in the XZ Utils backdoor, the attacker waited for a specific window to use the stolen credentials, bypassing the official GitHub release workflow and uploading the trojaned wheels directly to PyPI.

Immediate Remediation Steps

If you installed litellm versions 1.82.7 or 1.82.8, you must assume all credentials on that machine are compromised.

  1. Evict the Payload:

    pip uninstall litellm -y
    find $(python3 -c "import site; print(' '.join(site.getsitepackages()))") -name "litellm_init.pth" -delete
    
  2. Check for Persistence:

    systemctl --user stop sysmon.service
    rm -rf ~/.config/sysmon/
    
  3. Rotate All Keys: This includes OpenAI/Anthropic API keys, AWS/GCP secrets, and SSH keys. Changing the password is not enough; the active tokens have been exfiltrated.

Comments (0)

Sort by

Please login to comment

Sign in to share your thoughts and connect with the community

Loading...

Related news

Xiaomi's MiMo V2.5 Pro tops the GDPval-AA agentic benchmark with a score of 1578, outperforming Kimi K2.6 and DeepSeek V4 Pro in real-world work tasks.

Xiaomi MiMo V2.5 Pro Leads GDPval-AA Agentic Benchmarks

81 views•5 min
Google celebrates 20 years of Translate with a new interactive AI pronunciation tool and launches an experimental "Ask YouTube" conversational search feature.

Google Translate Adds AI Pronunciation Practice Tool

580 views•4 min
Turtle Beach's new Command Series peripherals feature customizable touchscreens for macro management and system monitoring. Discover the technical specs and release details.

Turtle Beach Command Series Touchscreen Peripheral Specs

79 views•3 min
Apple announces John Ternus will become CEO on September 1, 2026, while Tim Cook moves to Executive Chairman. An analysis of Apple's hardware-led future.

John Ternus Named Apple CEO as Tim Cook Shifts to Chairman

153 views•4 min
Anthropic Labs debuts Claude Design, a tool using Claude Opus 4.7 to generate interactive prototypes and design systems directly from existing codebases.

Anthropic Claude Design: Prototyping and Code Handoff Analysis

117 views•4 min
The DJI Osmo Pocket 4 introduces 4K/240p slow-motion and improved dynamic range. Here is how the hardware changes impact real-world vlogging and production.

DJI Osmo Pocket 4 Specs: 4K/240p and Improved Dynamic Range

89 views•3 min
Porsche reveals the 2027 911 GT3 S/C, combining the 510 PS naturally aspirated engine with a magnesium-ribbed automatic roof and 6-speed manual transmission.

2027 Porsche 911 GT3 S/C: Specs, Weight, and Analysis

135 views•5 min
Leaks suggest Apple will introduce a Deep Red finish for the iPhone 18 Pro, while Android manufacturers reportedly prepare similar shades for 2026.

iPhone 18 Pro Deep Red Color Leak and Android Response

90 views•3 min
US Treasury Secretary Scott Bessent convenes bank CEOs as Anthropic's Claude Mythos model demonstrates autonomous discovery of critical zero-day vulnerabilities.

Anthropic Mythos Prompts Treasury Meeting with Bank CEOs

276 views•5 min
GitButler, co-founded by GitHub’s Scott Chacon, raises $17M Series A to move software development beyond 20-year-old Git workflows and support AI collaboration.

GitButler Raises $17M to Redesign Version Control for AI

223 views•3 min
As Apple's M5 and Intel's Panther Lake arrive in 2026, the CPU is no longer the center of the chip. Discover how NPUs and specialized accelerators are taking over.

CPU vs NPU: The Shift to Specialized Silicon in 2026

162 views•4 min
Leaked specs for the MediaTek Dimensity 9600 reveal a 5GHz clock speed target, Arm Magni GPU, and TSMC N2p process for 2027 flagship smartphones.

MediaTek Dimensity 9600 Leaks: 5GHz and N2p Architecture

157 views•3 min
Apfel v0.7.2 wraps Apple’s FoundationModels framework in a Swift-based CLI and OpenAI-compatible server for private, 100% on-device AI inference on macOS.

Apfel: Accessing Local Apple Intelligence via CLI and API

151 views•5 min
Google launches Gemma 4, a new generation of open-source models built on Gemini technology. Learn about the technical specs, performance, and how to run it locally.

Google Gemma 4 Launch: Open-Source Models and Local Access

115 views•3 min
The Vivo X300 Ultra's Chinese launch reveals a significant price gap for international buyers. Explore the specs, import costs, and software limitations.

Importing the Vivo X300 Ultra: Costs, Specs, and Risks

128 views•4 min
Recent data reveals a surprising winner in vehicle durability. Learn why standard hybrids are outperforming both electric and gasoline cars in long-term reliability.

Hybrid vs. Electric vs. Gas Car Reliability Explained

130 views•4 min
Technical deep dive into the Axios npm compromise (v1.14.1 and v0.30.4). Analysis of the plain-crypto-js RAT dropper, OIDC bypass, and anti-forensic cleanup.

Technical Analysis: Axios npm Supply Chain Attack

161 views•5 min
As Apple marks 50 years, we examine the cultural and technical shifts that turned a garage startup into a $3.5 trillion titan through eight core product leaps.

Apple at 50: From Garage Startup to $3.5 Trillion Technology Pillar

222 views•3 min
A technical narrative of a 320GB production server failure, focusing on Samsung LRDIMM errors, kernel RAS logs, and the operational cost of technical negligence.

From Morning Crash to Evening Demolition: Proving a 320GB Production Server Failure When Management Derailed

123 views•6 min
Sony increases PlayStation 5 prices by $100, citing AI-driven memory demand and geopolitical instability. The hike affects PS5, PS5 Pro, and PlayStation Portal.

Sony Hikes PlayStation 5 Prices by $100 Amid Surging Memory Costs

134 views•3 min