Vhs Lady

10.6K posts

Vhs Lady banner
Vhs Lady

Vhs Lady

@VhsLady

Katılım Eylül 2014
2.5K Takip Edilen806 Takipçiler
Matua Kahurangi
Matua Kahurangi@MatuaKahurangi·
The Greens and MPs like Tamatha Paul want to abolish prisons. That means rapists & sex offenders get released straight back into the community. Nothing screams "compassion" like turning your neighbourhood into a free-range rehabilitation centre for serious offenders. #nzpol
English
97
44
276
6.1K
Vhs Lady
Vhs Lady@VhsLady·
@MightyBuddha01 @IntCyberDigest This is not the way to go about it. That’s idiot mentality. They’ve committed multiple crimes and they will get caught. It’s just a matter of time.
English
1
0
0
43
Mighty Buddha
Mighty Buddha@MightyBuddha01·
@VhsLady @IntCyberDigest Who's glamorizing what exactly? Destruction of trust? Yeah, no kidding - you thought your data was safe, turns out it isn't. Hopelessly trusting is not a good thing either. The way to move forward is with more transparency, not less.
English
1
0
1
69
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨‼️ We're in contact with the actor behind the Trivy and LiteLLM hack. They told us they are currently extorting several multi-billion-dollar companies from which they've exfiltrated data. They've obtained 300 GB of compressed credentials and are working their way through them as we speak. The LiteLLM compromise alone led to half a million stolen credentials, according to the threat actor. Their message to the world: "TeamPCP is here to stay. Long live the supply chain." They've sent us their new logo (see image) and also teamed up with several threat actors, including Xploiters and Vect.
International Cyber Digest tweet media
English
51
262
1.4K
162.2K
Vhs Lady
Vhs Lady@VhsLady·
@SocketSecurity Why are you quoting and agreeing with criminals? Doesn’t say much for the credibility of your brand.
English
0
0
0
185
Socket
Socket@SocketSecurity·
TeamPCP: "These companies were built to protect your supply chains yet they can't even protect their own, the state of modern security research is a joke, as a result we're gonna be around for a long time stealing terrabytes of trade secrets with our new partners."
Socket@SocketSecurity

🚨 TeamPCP is systematically targeting security tools across the #OSS ecosystem, turning scanners and CI pipelines into infostealers. Attacks spreading fast across GitHub Actions, OpenVSX, and PyPI. Details → socket.dev/blog/teampcp-t…

English
5
29
180
25K
Vhs Lady
Vhs Lady@VhsLady·
@adnanthekhan Real downstream harm to real developers. The silver lining that Claude caught & refused the prompt injection attack is genuinely satisfying though. Bot tries to weaponize Claude, Claude writes a detailed forensic takedown of the attack instead. 🦞 gets cooked.
English
0
0
0
13
Vhs Lady
Vhs Lady@VhsLady·
@adnanthekhan It should be deleted. Dummies building the wrong things with ai The audacity of putting “powered by claude-opus-4-5” while running active exploitation campaigns against Microsoft, CNCF projects, Aqua Using AI branding as a credibility/intimidation flex is a new kind of scummy.
English
1
0
0
19
Adnan Khan
Adnan Khan@adnanthekhan·
In this whole #Trivy chaos, people seem to be incorrectly linking the hackerbot-claw event to the initial #Trivy extension compromise.
English
1
2
11
2.1K
Vhs Lady
Vhs Lady@VhsLady·
@karpathy It’s disgusting to see the absolute glee and glorification of the loser “teampcp” thieves coming out of Sec community today. Some literally laughing at the irony and misfortune.
English
0
0
0
22
Andrej Karpathy
Andrej Karpathy@karpathy·
Software horror: litellm PyPI supply chain attack. Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds, Kubernetes configs, git credentials, env vars (all your API keys), shell history, crypto wallets, SSL private keys, CI/CD secrets, database passwords. LiteLLM itself has 97 million downloads per month which is already terrible, but much worse, the contagion spreads to any project that depends on litellm. For example, if you did `pip install dspy` (which depended on litellm>=1.64.0), you'd also be pwnd. Same for any other large project that depended on litellm. Afaict the poisoned version was up for only less than ~1 hour. The attack had a bug which led to its discovery - Callum McMahon was using an MCP plugin inside Cursor that pulled in litellm as a transitive dependency. When litellm 1.82.8 installed, their machine ran out of RAM and crashed. So if the attacker didn't vibe code this attack it could have been undetected for many days or weeks. Supply chain attacks like this are basically the scariest thing imaginable in modern software. Every time you install any depedency you could be pulling in a poisoned package anywhere deep inside its entire depedency tree. This is especially risky with large projects that might have lots and lots of dependencies. The credentials that do get stolen in each attack can then be used to take over more accounts and compromise more packages. Classical software engineering would have you believe that dependencies are good (we're building pyramids from bricks), but imo this has to be re-evaluated, and it's why I've been so growingly averse to them, preferring to use LLMs to "yoink" functionality when it's simple enough and possible.
Daniel Hnyk@hnykda

LiteLLM HAS BEEN COMPROMISED, DO NOT UPDATE. We just discovered that LiteLLM pypi release 1.82.8. It has been compromised, it contains litellm_init.pth with base64 encoded instructions to send all the credentials it can find to remote server + self-replicate. link below

English
1.3K
5.4K
28K
65.9M
Tony/Humpty
Tony/Humpty@cyb3rjerry·
@vxunderground Nah I was happy to see it unfold at work. TeamPCP is funny and these attacks are lowkey fun to enjoy, you always learn with them. I'll take that over a user getting phished AGAIN anytime of the day
English
3
0
15
3.6K
vx-underground
vx-underground@vxunderground·
Chat, I'll tell you one thing right now, this LiteLLM supply-chain attack is one big stinky mess. No information has been released publicly (yet) on vendors impacted, but the stink I've been sniffing suggests this is very serious shenanigans and DFIR nerds are not happy
English
29
62
1K
52.3K
Vhs Lady
Vhs Lady@VhsLady·
@adnanthekhan What a ….. and I do not say this lightly……:, fking degenerate c**t
English
1
0
3
1.1K
Adnan Khan
Adnan Khan@adnanthekhan·
The threat actor behind TeamPCP is calling it quits. The pace of work these days takes a toll on threat actors too.
Adnan Khan tweet media
English
21
24
256
36.9K
Vhs Lady
Vhs Lady@VhsLady·
@vxunderground It was only discovered cos they wrote sloppy code it used so much RAM it crashed a dev’s pc 1 dev using Cursor with an MCP plugin had litellm pulled in as a dependency their machine crashed & that crash saved 1000s of companies from getting their entire infrastructure stolen
English
0
0
0
174
vx-underground
vx-underground@vxunderground·
Whoa whoa whoa. Everyone CLAM down for a second. Earlier today someone broke the news that there was a supply chain attack impacting LiteLLM which had over 97 MILLION installs. Initially it was reported the payload was vibe coded which resulted in the payload failing. HOWEVER, this has been determined to be NOT TRUE. The payload was a SUCCESS. The payload failed in specific edge cases (currently unknown). The Threat Actor(s) managed to exfiltrate data from 500,000 infected machines (approx. 300gb of data). I have confirmed this from three different sources. The initially news which is spreading all over social media is incorrect and this is actually a very big bamboozle. They had one short, one opportunity, and did indeed seize it (but only failing in specific and unknown edge cases). It's all over for LLM-dependency nerds. Also, in a bit of irony, LiteLLM is SOC2 certified by Delve. This is very big shenanigans for a Tuesday.
vx-underground tweet media
English
53
202
2.5K
115.9K
Vhs Lady retweetledi
Vhs Lady
Vhs Lady@VhsLady·
@IntCyberDigest Stop glamorising these fkwits. wtf is wrong will all of you? these little shits just destroyed a whole bunch of businesses, & cost hard working people a fortune. Mindless brats. Not to mention the destruction of trust and the fking economic repercussions.
English
5
1
15
1.6K
TFTC
TFTC@TFTC21·
A hacker group just compromised one of the most widely used security scanners in the world, and used it to steal half a million credentials from companies that trusted it to keep them safe. On March 19, a threat actor group called TeamPCP injected credential-stealing malware into Trivy, a popular open-source vulnerability scanner maintained by Aqua Security. Trivy is used by thousands of companies to scan their code and infrastructure for security flaws. The attackers compromised 75 GitHub Action tags, the Trivy Docker images, and related CI/CD pipelines, meaning every company running automated security scans through Trivy was unknowingly executing the attackers' code. The malware harvested SSH keys, cloud credentials, Kubernetes secrets, cryptocurrency wallets, and .env files from every environment it touched. The stolen data was encrypted and exfiltrated to attacker-controlled servers. But the attack didn't stop there. Using credentials stolen from Trivy's CI/CD pipeline, TeamPCP then backdoored LiteLLM, a widely used Python framework for managing AI model APIs. Two malicious versions (1.82.7 and 1.82.8) were pushed to PyPI, the main Python package repository. The second version was designed to execute automatically on every Python process startup in the environment, no user interaction required. From there, it deployed privileged pods across entire Kubernetes clusters and installed persistent backdoors on every node. The attackers also pushed compromised Docker images of Trivy (versions 0.69.4, 0.69.5, 0.69.6) to Docker Hub and compromised dozens of npm packages with a self-spreading worm called CanisterWorm. They even defaced 44 internal Aqua Security repositories in a scripted 2-minute burst, renaming them all with "TeamPCP Owns Aqua Security." According to the International Cyber Digest, which is in direct contact with the attackers, TeamPCP claims to have exfiltrated 300 GB of compressed credentials and is actively working through them. The LiteLLM compromise alone reportedly yielded half a million stolen credentials. The group says it is currently extorting several multi-billion-dollar companies. Each compromised environment yielded credentials that unlocked the next target. The pivot from CI/CD pipelines to production Python packages running in Kubernetes clusters was deliberate escalation. Security researchers say this campaign is "almost certainly not over." This is what a modern supply chain attack looks like. The tools companies trust to secure their infrastructure become the attack vector. The irony is brutal, the security scanner was the vulnerability.
TFTC tweet media
English
32
203
701
73.6K
Vhs Lady
Vhs Lady@VhsLady·
@hnykda teampcp started with Trivy…. ∙Expanded to Checkmarx ∙Now BerriAI/litellm ∙Escalating campaign ∙Sysdig documented them ∙This is the same actor
English
0
0
0
178
Daniel Hnyk
Daniel Hnyk@hnykda·
LiteLLM HAS BEEN COMPROMISED, DO NOT UPDATE. We just discovered that LiteLLM pypi release 1.82.8. It has been compromised, it contains litellm_init.pth with base64 encoded instructions to send all the credentials it can find to remote server + self-replicate. link below
English
306
2.3K
9.4K
5.6M
Vhs Lady
Vhs Lady@VhsLady·
@simonw Bots drowning out the warnings in realtime.
English
0
0
1
232
Vhs Lady
Vhs Lady@VhsLady·
@simonw teampcp started with Trivy…. ∙Expanded to Checkmarx ∙Now BerriAI/litellm ∙Escalating campaign ∙Sysdig documented them ∙This is the same actor
English
0
0
0
202
martinuke0
martinuke0@martinuke0·
@hnykda they're having the time of their lives lmao
martinuke0 tweet media
English
2
1
35
10.7K
Kentucky Girl
Kentucky Girl@Notwokenow·
“When ICE comes to town…..get a sniper and shoot….blow their f’ing faces off….watch them f’ing drown in their own bl00d…”
English
2.2K
1.9K
2.2K
288.5K
KJ
KJ@goingbykate·
i'll never forget when brooke van velden likened beneficiaries to stubborn, thick, lazy donkeys and cast herself as the donkey driver waggling a carrot around to incentivise them to work.
English
29
30
212
6K