LiteLLM hacking incident: 500,000 credentials leaked, cryptocurrency wallets may be stolen, how to check if you're affected?

ETH2,77%

Author: HIBIKI, Crypto City

LiteLLM suffers supply chain attack, hundreds of GB of data and 500,000 credentials leaked
The AI open-source package LiteLLM, which has a daily download volume of up to 3.4 million, is an important bridge for many developers connecting multiple large language models (LLMs), but it has recently become a target for hackers. Kaspersky estimates that this wave of attacks has exposed over 20,000 code repositories to risk, and hackers claim to have stolen hundreds of GB of confidential data and over 500,000 account credentials, causing a serious impact on global software development and cloud environments.
After tracing back through cybersecurity experts, it was discovered that the source of the LiteLLM hacking incident was the open-source security tool Trivy, which many companies use to scan for system vulnerabilities.
This is a typical nested supply chain attack, where hackers target the upstream trusted tools relied upon by the target, quietly inserting malicious code, akin to poisoning the water supply at a water plant, causing all consumers to unknowingly fall victim.

Image source: Trivy | The source of the LiteLLM hacking incident turned out to be the open-source security tool Trivy, which many companies use to scan for system vulnerabilities.

Full process of the LiteLLM attack: from security tool to AI package chain reaction
According to analysis by cybersecurity companies Snyk and Kaspersky, the LiteLLM attack incident had been brewing as early as the end of February 2026.
Hackers exploited a vulnerability in GitHub’s CI/CD (a process for automated software testing and deployment) to steal the access token of Trivy maintainers. Since the token was not fully revoked, hackers successfully tampered with Trivy’s release tags on March 19, allowing the automated process to download a scanning tool containing malicious code.
Subsequently, hackers used the same method to take control of LiteLLM’s release permissions on March 24 and uploaded versions 1.82.7 and 1.82.8 containing malicious code.
At this time, developer Callum McMahon encountered an issue while testing the Cursor editor’s extension, as the system automatically downloaded the latest version of LiteLLM, causing his computer resources to be instantly depleted.
Through AI assistance Debug, he discovered that the malicious code contained a flaw that unexpectedly triggered a fork bomb, which is a malicious action that continuously self-replicates and exhausts computer memory and computing resources, leading to the early exposure of this covert attack.
According to Snyk’s analysis, the malicious code in this attack is divided into three phases:

  • Data Collection: The program fully scrapes sensitive information from the victim’s computer, including SSH remote connection keys, cloud service (AWS, GCP) access credentials, and seed codes for cryptocurrency wallets like Bitcoin and Ethereum.
  • Encryption and Leakage: The collected data is encrypted and packaged, then secretly sent to a fake domain pre-registered by the hackers.
  • Persistent Presence and Lateral Movement: The malicious program implants a backdoor in the system, and if it detects Kubernetes, an open-source platform environment used for automating the deployment and management of containerized applications, it will attempt to spread the malicious program to all nodes in the cluster.

Timeline of LiteLLM and Trivy supply chain attacks

Is your wallet and credentials safe? Detection and remediation guide
If you have installed or updated the LiteLLM package after March 24, 2026, or if your automated development environment has used the Trivy scanning tool, your system is likely compromised.
According to Callum McMahon and Snyk’s recommendations, the primary task for protection and remediation is to confirm the extent of the compromise and thoroughly block the hackers’ backdoors.


Kaspersky recommends using the following open-source tools to enhance the security of GitHub Actions:

  • zizmor: This is a tool for static analysis and detecting configuration errors in GitHub Actions.
  • gato and Gato-X: These two versions of the tool are mainly used to help identify automated process pipelines with structural vulnerabilities.
  • allstar: A GitHub application developed by the Open Source Security Foundation (OpenSSF), specifically designed to set and enforce security policies within GitHub organizations and repositories.

Behind the LiteLLM attack, hackers have already set their sights on the lobster farming craze
According to analysis by Snyk and engineer Huli, who focuses on cybersecurity, the mastermind behind this case is a hacker group called TeamPCP, which has been active since December 2025 and frequently establishes channels for activities through communication tools like Telegram.
Huli pointed out that during the attack process, hackers used an automated attack component called hackerbot-claw. This name cleverly aligns with the recent trend of AI agents in the AI community known as lobster farming (OpenClaw).
These hackers precisely targeted high-privilege and widely used infrastructure tools, including Trivy and LiteLLM, and understood how to leverage the latest AI trends to expand the scale of the attack, demonstrating highly organized and targeted criminal methods.

Image source: Huli Random Chat | Engineer Huli explains the Trivy and LiteLLM supply chain attack incident (partial screenshot)

With the proliferation of AI tools, permission control and supply chain security in the development process have become risks that all companies cannot ignore.
Cases such as the recent hacking of well-known developers’ NPM accounts, leading to the injection of malicious code into JavaScript packages, potentially impacting numerous DApps and wallets; or Anthropic revealing that Chinese hackers launched the first large-scale AI automated cyber espionage operation through Claude Code, should all serve as warnings.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

RAVE Token Surges 110x in Two Weeks, Then Crashes 98% Amid Market Manipulation Allegations

Gate News message, April 27 — RAVE, the native token of RaveDAO (a Web3-based cultural community project), skyrocketed 110x in two weeks before plummeting 98% over two days on April 19-20, prompting comparisons to the infamous 2007 Lubo stock manipulation scandal in South Korea. On April 18, RAVE r

GateNews24m ago

Research reveals: Polymarket players take home 30% of profits by winning 3% of the positions—more than 70% of players absorb all losses

A new study analyzes Polymarket’s trading records from 2023–2025 and shows that only 3.14% of experienced winners control more than 30% of the profits. Crowd participation alone is not enough to explain overall accuracy; at the same time, it tracks 1,950 highly suspicious insider trading accounts that, while not driving predictions, amplified price volatility. The case shows that large bets were placed and profits were made before the U.S. announced developments regarding Venezuela. The research questions “wisdom of crowds” and emphasizes the need for increasingly strict regulation.

ChainNewsAbmedia1h ago

France: More than 40 crypto investor kidnappings in 2026, involving leaked tax data

According to Market Forces Africa, reported on April 27, incidents of kidnapping and violent attacks targeting cryptocurrency investors in France have increased sharply. On the X platform, Telegram founder Pavel Durov said that since the beginning of 2026, he has recorded 41 cases of cryptocurrency investor kidnappings, averaging one incident every 2.5 days, and that they are linked to a leak of French tax records.

MarketWhisper1h ago

Hubei cybersecurity police received a Second Class Merit Award, solving the province’s first “hundred-million-yuan” virtual-coin theft case in 70 days

According to a report by Hubei Daily on April 27, Guo Tingyu, a police officer from the Cyber Security Brigade of the Qingshan Branch of the Wuhan Municipal Public Security Bureau, was recently awarded the Individual Second-Class Merit. Guo Tingyu graduated from Huazhong University of Science and Technology with a degree in computer science. In 2023, he passed the civil service exam to join the police force. In early 2024, he took charge of the first virtual currency theft case in all of Hubei Province. After nearly 70 days of investigation and case-solving, the amount of involved funds exceeded 100 million yuan, and all five suspects were fully dealt with in accordance with the law.

MarketWhisper1h ago

Litecoin Executes Deep Chain Reorganization to Undo MWEB Privacy Layer Exploit

Gate News message, April 27 — Litecoin underwent a deep chain reorganization on Saturday (April 26) after attackers exploited a zero-day vulnerability in its MimbleWimble Extension Block (MWEB) privacy layer, the Litecoin Foundation announced. The reorg spanned blocks 3,095,930 to 3,095,943 and

GateNews2h ago

China Breaks Cryptocurrency Theft Ring Worth Over $140 Million, Arrests 5 Suspects

Gate News message, April 27 — A cybercrime unit in Wuhan, China's Hubei Province, has dismantled a cryptocurrency theft ring involving counterfeit wallet applications, with investigations revealing over 100 million yuan (approximately $14 million) in illicit proceeds. Five suspects have been

GateNews2h ago
Comment
0/400
No comments