A critical supply chain attack was discovered in litellm versions 1.82.7 and 1.82.8 on PyPI. Two different injection techniques were used: a malicious `.pth` file in 1.82.8 that executes on every Python startup, and a base64-encoded payload embedded in `proxy_server.py` in 1.82.7. Both versions carry an identical three-stage
Table of contents
Background: What Is litellm?The Entry Points: Two Versions, Two Injection TechniquesStage 1: Mass Credential HarvesterStage 2: Persistent C2 BackdoorStage 3: Kubernetes Lateral MovementControlled Execution AnalysisDownstream ImpactThe Comment Spam CampaignAttack Flow SummaryRemediationHow StepSecurity HelpsReferencesSort: