<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Compromise — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/compromise/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 12:12:58 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/compromise/feed.xml" rel="self" type="application/rss+xml"/><item><title>Compromised Litellm PyPI Package Versions</title><link>https://feed.craftedsignal.io/briefs/2024-01-litellm-compromise/</link><pubDate>Tue, 24 Mar 2026 12:12:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-litellm-compromise/</guid><description>Versions 1.82.7 and 1.82.8 of the Litellm package on PyPI were compromised in a supply chain attack, potentially impacting numerous users, with recommendations to avoid updating to these versions.</description><content:encoded><![CDATA[<p>On March 24, 2026, versions 1.82.7 and 1.82.8 of the Litellm package, available on the Python Package Index (PyPI), were reported as compromised. This supply chain attack potentially affects thousands of users who may have updated to the malicious versions. The compromised packages could contain malicious code injected by an unknown threat actor. Users are advised to avoid updating to these versions and investigate their systems for potential compromise. The initial report came from a Reddit post and links to a blog post for further details.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>While the specifics of the attack chain are not fully detailed in the source, a typical supply chain attack targeting PyPI packages involves the following steps:</p>
<ol>
<li><strong>Package Compromise:</strong> Threat actor gains unauthorized access to the Litellm PyPI account or the build environment.</li>
<li><strong>Malicious Code Injection:</strong> The attacker injects malicious code into the setup.py or other relevant files within the Litellm package. This malicious code could be designed to execute upon installation.</li>
<li><strong>Version Release:</strong> The compromised versions, 1.82.7 and 1.82.8, are released to PyPI, making them available for users to download and install.</li>
<li><strong>Package Installation:</strong> Users unknowingly download and install the compromised Litellm package using pip, triggering the execution of the injected malicious code.</li>
<li><strong>Initial Access:</strong> The malicious code may establish a reverse shell, download additional payloads, or perform other actions to gain initial access to the victim&rsquo;s system.</li>
<li><strong>Persistence:</strong> The attacker may establish persistence on the compromised system through various techniques, such as creating scheduled tasks or modifying startup scripts.</li>
<li><strong>Data Exfiltration/Malware Deployment:</strong> Depending on the attacker&rsquo;s objective, they may exfiltrate sensitive data, deploy ransomware, or perform other malicious activities.</li>
<li><strong>Lateral Movement:</strong> The attacker may attempt to move laterally to other systems within the compromised network, escalating their access and expanding their reach.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of Litellm versions 1.82.7 and 1.82.8 could lead to widespread compromise of systems that use the package. The injected malicious code could enable attackers to steal sensitive information, deploy malware, or gain unauthorized access to victim systems. The number of affected users is estimated to be in the thousands. This incident highlights the risks associated with supply chain attacks targeting open-source software repositories.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately stop updating to Litellm versions 1.82.7 and 1.82.8.</li>
<li>Revert to a known-good version of Litellm prior to 1.82.7.</li>
<li>Analyze network connections for suspicious traffic originating from systems where the compromised Litellm versions were installed, using network connection logs.</li>
<li>Monitor process creations for suspicious processes spawned from Python executables where Litellm is installed, using process creation logs and the Sigma rules provided below.</li>
<li>Investigate systems where Litellm 1.82.7 or 1.82.8 were installed for any signs of compromise.</li>
<li>Review the blog post at <a href="https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack/">https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack/</a> for further details on the compromise.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>pypi</category><category>litellm</category><category>compromise</category></item></channel></rss>