On March 19, 2026, a threat actor group identified as TeamPCP initiated a sophisticated, multi-stage supply chain attack by compromising the release infrastructure for Aqua Security's popular open-source vulnerability scanner, Trivy. The attackers manipulated GitHub Actions tags to inject credential-stealing malware into CI/CD pipelines of dependent projects. The campaign escalated over several days, with the actors pivoting to compromise a Checkmarx KICS GitHub Action and ultimately publishing trojanized versions of the LiteLLM AI gateway on the Python Package Index (PyPI). The malicious LiteLLM packages (1.82.7 and 1.82.8) were specifically engineered to exfiltrate AI API keys and other secrets to an attacker-controlled domain. This incident demonstrates a dangerous evolution in supply chain attacks, showcasing how compromising a single trusted tool can create a cascading effect that compromises a vast ecosystem of developer tools and AI infrastructure.
This attack represents a significant threat to the open-source software ecosystem. The initial point of entry was the compromise of the aquasecurity/trivy-action and aquasecurity/setup-trivy GitHub Actions. Instead of altering the code in the main branch, TeamPCP employed a stealthy technique by force-pushing existing version tags to point to malicious commits. This meant that any CI/CD pipeline referencing these version tags (e.g., @v0.18.0) would unknowingly pull and execute the attackers' malicious code. The malware was designed for broad-spectrum credential theft, targeting SSH keys, cloud provider tokens, and cryptocurrency wallets.
Following the initial success, the attackers used the stolen credentials to expand their reach. On March 23, a similar compromise was found in a GitHub Action for Checkmarx KICS. The final and most impactful stage occurred on March 24, when malicious versions of LiteLLM were uploaded to PyPI. LiteLLM, which acts as a unified interface to over 100 Large Language Model (LLM) APIs, is a critical component in many AI applications. By compromising it, the attackers positioned themselves to harvest a massive number of API keys for services like OpenAI, Anthropic, and Google Gemini, giving them access to powerful and costly AI resources.
The attack chain began with the exploitation of credentials from a previous, insufficiently remediated security incident, allowing the attackers to gain access to Trivy's release infrastructure. This aligns with the MITRE ATT&CK technique T1078 - Valid Accounts.
The core of the attack involved manipulating CI/CD pipelines, a classic supply chain compromise technique.
T1195.001 - Compromise Software Dependencies and Development Tools.T1059.006 - Python and T1059.004 - Unix Shell for script execution within the build environment.T1555.004 - SSH-Agent Hijacking), cloud tokens, and other credentials from the build environment.1.82.7, 1.82.8) of the litellm package to PyPI. The malicious code was embedded in proxy_server.py.models.litellm[.]cloud via T1041 - Exfiltration Over C2 Channel.This attack's stealth was enhanced by manipulating tags rather than code, a method that bypasses many standard code review and integrity checks. It underscores the importance of verifying the commit hash associated with a tag, not just the tag itself.
The business impact of this attack is severe and widespread. Any organization using the compromised versions of the Trivy or Checkmarx GitHub Actions may have had sensitive credentials and secrets exfiltrated from their build environments. This could lead to further network compromise, data breaches, and financial loss.
The compromise of LiteLLM is particularly damaging. Organizations using the malicious versions are at risk of having their AI API keys stolen. This could result in significant financial costs from unauthorized use of expensive LLM services, theft of proprietary data sent to or from these models, and potential abuse of the models for malicious purposes like generating disinformation or malware.
The attack erodes trust in the open-source ecosystem and highlights the fragility of software supply chains. The reputational damage to the compromised projects is significant, and the incident forces thousands of downstream developers to perform urgent security audits, patch systems, and rotate credentials, leading to widespread productivity loss.
| Type | Value | Description |
|---|---|---|
| domain | models.litellm[.]cloud |
Attacker-controlled C2 server for data exfiltration. |
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| url_pattern | /v1/ |
The malicious LiteLLM code intercepted requests to the /v1/ endpoint. |
Web server logs on proxy servers using LiteLLM. | high |
| file_name | proxy_server.py |
The file containing the malicious code in the compromised LiteLLM package. | File integrity monitoring on systems with LiteLLM installed. | high |
| command_line_pattern | git show-ref --verify refs/tags/ |
Command to verify the commit hash of a Git tag. | CI/CD build logs, developer terminal history. | medium |
| network_traffic_pattern | DNS queries to models.litellm.cloud |
Outbound DNS requests to the known malicious domain. | DNS logs, network security monitoring tools. | high |
| log_source | GitHub Audit Logs |
Look for git.force_push events on critical repositories. |
GitHub Enterprise or organization audit logs. | high |
| file_path | ~/.ssh/id_rsa |
A common target for credential theft malware in build environments. | File access monitoring on build agents. | medium |
Detection:
File Analysis can be applied to build artifacts.models.litellm[.]cloud. Use D3FEND's Outbound Traffic Filtering and Network Traffic Analysis.1.82.7, 1.82.8). Use pip list or other dependency analysis tools to identify affected systems.git.force_push events, especially on repositories that publish release artifacts or GitHub Actions.Response:
1.82.9 or later) after verifying its integrity.Strategic Mitigation:
requirements.txt with --hash). This is a form of D3FEND's Application Configuration Hardening.Tactical Mitigation:
AI firm Mercor confirmed as victim of the LiteLLM supply chain attack, with Lapsus$ claiming 4TB data theft and extortion. This escalates the incident's real-world impact.
Enforce cryptographic signing of all commits, tags, and release artifacts. This allows downstream users to verify the integrity and authenticity of the code they are consuming, making it harder for attackers to inject malicious code undetected.
Regularly audit CI/CD pipeline logs, repository access logs, and especially GitHub audit logs for suspicious activities like force pushes to protected branches or tags.
Implement strict egress filtering on build agents to block outbound connections to any destination not on an explicit allowlist. This could have prevented the exfiltration of stolen credentials to the attacker's C2 server.
Mapped D3FEND Techniques:
Configure dependency management tools to pin dependencies to specific, verified hashes rather than mutable tags. This ensures that builds are reproducible and not susceptible to tag manipulation.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats