The AI recruiting startup Mercor has become a high-profile victim of a recent software supply chain attack that targeted the open-source LiteLLM project. The company confirmed it was impacted after malicious versions of the LiteLLM PyPI package were published on March 27. The incident has been exacerbated by a claim from the notorious extortion group Lapsus$, which has listed Mercor on its data leak site and boasted of stealing over 4 terabytes of data. This attack underscores the significant and cascading risks of supply chain security, where a brief compromise of one component can lead to a catastrophic breach for downstream users.
The incident is a multi-layered supply chain attack. The attack chain appears to be as follows:
1.82.7 and 1.82.8. These versions were available for download for approximately 40 minutes.This incident highlights how quickly a supply chain compromise can be weaponized. The 40-minute window was enough for the malicious package to be integrated into a company's systems, leading to a major data breach.
The attack demonstrates several key TTPs associated with modern supply chain and extortion attacks:
T1195.002 - Compromise Software Supply Chain: Compromise Software: The core of the attack was the injection of malicious code into the LiteLLM PyPI package.T1078 - Valid Accounts: Attackers used a compromised maintainer's credentials to publish the malicious code, a hallmark of groups like Lapsus$.T1567 - Exfiltration Over Web Service: Lapsus$'s claim of stealing 4TB of data implies the use of large-scale data exfiltration techniques, likely over standard web protocols to blend in with normal traffic.T1659 - Content Injection: Malicious code was injected into the legitimate LiteLLM package.Lapsus$ is known for its focus on high-impact data theft and extortion, often gaining initial access through social engineering or compromising developer accounts rather than using sophisticated malware.
For Mercor, the impact is severe and multi-faceted:
The broader impact on the open-source community is a further erosion of trust in public package registries and a stark reminder of the fragility of the software supply chain.
Mercor has taken the correct initial steps by containing the incident and engaging third-party forensic experts.
For other potential victims:
requirements.txt files for the malicious LiteLLM versions (1.82.7, 1.82.8).requirements.txt or a similar lockfile. This is a critical form of D3-ACH: Application Configuration Hardening.Meta suspended its partnership with Mercor after the LiteLLM supply chain attack exposed sensitive AI training data from clients like Meta, OpenAI, and Anthropic.
Pin software dependencies to specific, vetted versions to prevent the automatic inclusion of malicious updates.
Mapped D3FEND Techniques:
Implement strict egress filtering on build servers to block unauthorized outbound connections, preventing data exfiltration.
Mapped D3FEND Techniques:
To prevent incidents like the LiteLLM compromise, organizations must enforce dependency pinning as a strict policy. Instead of allowing version ranges (e.g., litellm>=1.82.0), all requirements.txt or pyproject.toml files must specify exact versions (e.g., litellm==1.82.6). This should be enforced with pre-commit hooks and CI pipeline checks. This simple configuration change prevents package managers from automatically fetching a newly published malicious version, giving security teams time to vet updates before they are introduced into any environment. This directly counters the attack vector that allowed Mercor to be compromised within the 40-minute window.
To mitigate the impact of a potential breach like the one claimed by Lapsus$, implement strict egress filtering on all CI/CD runners and production servers. By default, these systems should be denied all outbound internet access. Create explicit allowlist rules for only the necessary destinations, such as connections to a private package mirror, specific API endpoints, or log aggregation services. This 'deny-by-default' posture would have made it extremely difficult for the compromised LiteLLM package to exfiltrate 4TB of data, as its connections to an unknown exfiltration server would have been blocked. This control shifts the security posture from trying to detect malicious activity to preventing it outright.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats