Lapsus$ Claims Theft of 4TB of Data from AI Firm Mercor in LiteLLM Supply Chain Attack

Lapsus$ Claims 4TB Data Theft from AI Firm Mercor Following LiteLLM Supply Chain Attack

CRITICAL
April 2, 2026
April 5, 2026
6m read
Supply Chain AttackData BreachThreat Actor

Impact Scope

Affected Companies

Mercor

Industries Affected

TechnologyOther

Related Entities(initial)

Threat Actors

Lapsus$ TeamPCP

Products & Tech

LiteLLMTrivyPyPI

Other

Mercor

Full Report(when first published)

Executive Summary

The AI recruiting startup Mercor has become a high-profile victim of a recent software supply chain attack that targeted the open-source LiteLLM project. The company confirmed it was impacted after malicious versions of the LiteLLM PyPI package were published on March 27. The incident has been exacerbated by a claim from the notorious extortion group Lapsus$, which has listed Mercor on its data leak site and boasted of stealing over 4 terabytes of data. This attack underscores the significant and cascading risks of supply chain security, where a brief compromise of one component can lead to a catastrophic breach for downstream users.


Threat Overview

The incident is a multi-layered supply chain attack. The attack chain appears to be as follows:

  1. Initial Dependency Compromise: The attack reportedly began with the compromise of Trivy, a dependency that Mercor used in its CI/CD security scanning pipeline.
  2. Maintainer Credential Theft: The threat actor, identified as TeamPCP, used credentials stolen from a compromised maintainer to gain publishing rights to the LiteLLM PyPI package.
  3. Malicious Publication: On March 27, TeamPCP published two malicious versions of LiteLLM: 1.82.7 and 1.82.8. These versions were available for download for approximately 40 minutes.
  4. Downstream Compromise: Mercor, using LiteLLM in its environment, pulled one of the malicious versions during this window, leading to a compromise of its systems.
  5. Extortion and Data Leak: The Lapsus$ group subsequently claimed to have exploited this access to exfiltrate 4TB of data from Mercor and is now using this claim for extortion.

This incident highlights how quickly a supply chain compromise can be weaponized. The 40-minute window was enough for the malicious package to be integrated into a company's systems, leading to a major data breach.

Technical Analysis

The attack demonstrates several key TTPs associated with modern supply chain and extortion attacks:

Lapsus$ is known for its focus on high-impact data theft and extortion, often gaining initial access through social engineering or compromising developer accounts rather than using sophisticated malware.

Impact Assessment

For Mercor, the impact is severe and multi-faceted:

  • Massive Data Breach: The alleged theft of 4TB of data could include highly sensitive information, such as client data, candidate PII, proprietary source code, and internal company documents. This poses an immense privacy and security risk.
  • Reputational Damage: Being publicly named on a leak site by a group like Lapsus$ causes significant damage to a company's reputation and erodes customer trust, which is particularly damaging for a recruiting firm.
  • Financial Loss: The costs of forensic investigation, remediation, potential regulatory fines (e.g., GDPR), and potential loss of business will be substantial.
  • Intellectual Property Theft: The loss of proprietary AI models and source code could be devastating for an AI-focused startup.

The broader impact on the open-source community is a further erosion of trust in public package registries and a stark reminder of the fragility of the software supply chain.

Detection & Response

Mercor has taken the correct initial steps by containing the incident and engaging third-party forensic experts.

For other potential victims:

  1. Dependency Check: Immediately check all Python environments and requirements.txt files for the malicious LiteLLM versions (1.82.7, 1.82.8).
  2. Log Review: Analyze CI/CD and server logs from March 27 to see if the malicious packages were downloaded and installed.
  3. Hunt for Exfiltration: Monitor network logs for any anomalous large outbound data transfers around the time of the incident. This can be aided by D3-NTA: Network Traffic Analysis.

Mitigation

  • Pin Dependencies: Do not use floating versions for dependencies in production. Pin all packages to a specific, vetted version in requirements.txt or a similar lockfile. This is a critical form of D3-ACH: Application Configuration Hardening.
  • Local Package Mirror: For critical dependencies, consider hosting a private, vetted mirror of the package registry. This prevents malicious updates from being pulled directly from the public internet.
  • CI/CD Security: Implement security scanning (SCA) in the CI/CD pipeline to check for malicious or vulnerable packages before they are installed. However, as this incident shows, the scanner's own dependencies must also be secure.
  • Egress Filtering: Implement strict egress filtering on build servers and production environments to block unexpected outbound connections, which can prevent data exfiltration. This aligns with D3-OTF: Outbound Traffic Filtering.
  • Enforce MFA: Mandate MFA for all developer accounts on platforms like GitHub and PyPI to make credential compromise more difficult.

Timeline of Events

1
March 27, 2026
Malicious versions of the LiteLLM PyPI package were published and available for approximately 40 minutes.
2
April 2, 2026
This article was published

Article Updates

April 5, 2026

Meta suspended its partnership with Mercor after the LiteLLM supply chain attack exposed sensitive AI training data from clients like Meta, OpenAI, and Anthropic.

MITRE ATT&CK Mitigations

Pin software dependencies to specific, vetted versions to prevent the automatic inclusion of malicious updates.

Mapped D3FEND Techniques:

Implement strict egress filtering on build servers to block unauthorized outbound connections, preventing data exfiltration.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Continuously audit software dependencies using SCA tools to detect malicious or vulnerable packages in the CI/CD pipeline.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To prevent incidents like the LiteLLM compromise, organizations must enforce dependency pinning as a strict policy. Instead of allowing version ranges (e.g., litellm>=1.82.0), all requirements.txt or pyproject.toml files must specify exact versions (e.g., litellm==1.82.6). This should be enforced with pre-commit hooks and CI pipeline checks. This simple configuration change prevents package managers from automatically fetching a newly published malicious version, giving security teams time to vet updates before they are introduced into any environment. This directly counters the attack vector that allowed Mercor to be compromised within the 40-minute window.

To mitigate the impact of a potential breach like the one claimed by Lapsus$, implement strict egress filtering on all CI/CD runners and production servers. By default, these systems should be denied all outbound internet access. Create explicit allowlist rules for only the necessary destinations, such as connections to a private package mirror, specific API endpoints, or log aggregation services. This 'deny-by-default' posture would have made it extremely difficult for the compromised LiteLLM package to exfiltrate 4TB of data, as its connections to an unknown exfiltration server would have been blocked. This control shifts the security posture from trying to detect malicious activity to preventing it outright.

Sources & References(when first published)

Mercor Hit by LiteLLM Supply Chain Attack
SecurityWeek (securityweek.com) April 2, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

supply chainLapsus$PyPILiteLLMdata breachextortion

📢 Share This Article

Help others stay informed about cybersecurity threats