On March 24, 2026, threat actor TeamPCP published two malicious versions of the LiteLLM Python package to PyPI (versions 1.82.7 and 1.82.8). The packages were available for approximately three hours before being quarantined by PyPI. The malicious payloads were designed to exfiltrate credentials including cloud provider keys, API tokens, Slack and Discord secrets. Version 1.82.7 injected a base64-encoded payload into the proxy server module, while 1.82.8 used a .pth file that executes automatically on every Python startup — meaning compromise persists even after upgrading. The attack was enabled by a prior compromise of Trivy
scanner, which was used in LiteLLM’s CI/CD pipeline. Organizations should verify no instances are running versions 1.82.7 or 1.82.8, rotate all credentials on affected systems, and check for the presence of litellm_init.pth in Python site-packages.
The IONIX research team is tracking this supply chain attack.
References:

