
MOXFIVE just published a Threat Actor Alert on TeamPCP's active software supply chain campaign. LiteLLM versions 1.82.7 and 1.82.8 on PyPI contain a malicious payload, the latest development in a campaign that has been running since March 19, hitting Trivy, GitHub Actions, Docker Hub, npm, and Checkmarx KICS before reaching PyPI.
🔸 March 19: Trivy compromised, 10,000+ CI/CD pipelines exposed
🔸 March 20: Stolen npm tokens seeded CanisterWorm across 64+ packages
🔸 March 22: Malicious Trivy Docker images pushed directly to Docker Hub
🔸 March 23: Checkmarx KICS GitHub Action tags hijacked
🔸 March 24: LiteLLM 1.82.7 and 1.82.8 published to PyPI with a malicious payload
The full report covers the complete campaign timeline and includes resilience recommendations for organizations that may have been exposed.
Read the full report: bit.ly/4takNBY
Have questions or need help responding? Reach out to our team at incident@moxfive.com or 833-568-6695.
#SupplyChainSecurity #ThreatIntelligence #IncidentResponse #Cybersecurity #IR #TeamPCP #LiteLLM #Trivy #Checkmarx

English















