Overview
- Mercor said it was one of thousands hit by the LiteLLM incident and reported that its team contained the issue and brought in outside forensics to investigate.
- Lapsus$ listed Mercor on its leak site and claims to hold about 4 TB of stolen data, including source code and personal records, though these claims have not been verified.
- LiteLLM maintainers reported that attackers tied to TeamPCP used a compromised maintainer account to publish PyPI versions 1.82.7 and 1.82.8 that harvested credentials.
- The booby-trapped releases were live for roughly 40 minutes yet likely auto-downloaded by many projects because LiteLLM is embedded in a large share of cloud builds.
- Wiz and Mandiant say the stolen logins were quickly used to access cloud and SaaS accounts, with responders tracking more than 1,000 affected environments and warning of collaborations between TeamPCP, Lapsus$, CipherForce, and Vect to monetize the theft.