Two malicious versions of the litellm PyPI package (1.82.7 and 1.82.8) were published and available for at least two hours, potentially exposing millions of daily users to a multi-stage credential stealer. The payload operates in three layers: the first exfiltrates data using AES-256-CBC encryption with an RSA-wrapped session
1 Comment
Sort: