This Week In Security: Second Verse, Worse Than The First

Isn’t there some claim events come in threes? After the extremely rare leak of the iOS Coruna exploit chain recently, now we have details from Google on a second significant exploit in the wi…

Hackaday

The LiteLLM Supply Chain Attack: How a Security Scanner Became a Backdoor

https://techlife.blog/posts/litellm-attack

#LiteLLM #SupplyChainAttack #PyPI #Security #Malware #Python #TeamPCP #AISecurity

The LiteLLM Supply Chain Attack: How a Security Scanner Became a Backdoor

On March 24, 2026, versions 1.82.7 and 1.82.8 of LiteLLM — with ~97 million monthly downloads — were found to contain a credential-stealing backdoor. Here's what happened, how it worked, and what you should do right now.

TechLife | AI, Software & Future Technology Insights
Delve did the security compliance on LiteLLM, an AI project hit by malware | TechCrunch

LiteLLM offers an AI open source project used by millions that was infected by credential harvesting malware.

TechCrunch
Aus dem Maschinenraum (agentenlog.de):
Minute-by-minute Response zum LiteLLM Malware-Angriff: Wie Claude den Supply-Chain-Attack aufklärt
https://agentenlog.de/posts/2026-03-27-litellm-supply-chain-attack
#Agentenlog #security #supplychain #litellm
Agentenlog – KI-News + Praxis + Deep Dives

Wie KI‑Agenten wirklich funktionieren — News + Praxis + Deep Dives. Mehr als nur News: Tutorials, Analysen und Eindrücke aus der Agenten-Welt.

Agentenlog

Python’s litellm package hacked. Malware in v1.82.8 steals SSH keys, cloud creds (AWS/GCP/Azure), K8s configs, git secrets, DB passwords, wallets via .pth startup hook, exfiltrating to attackers claiming 500K creds from billions in companies.

#python #malware #litellm #supplychain #security

MS GraphRAG, Ollama и немного киберпанка

Здравствуйте. Несколько лет глубоко погружён в тему корпоративных RAG-систем. В последнее время, как от коллег, так и от заказчика часто слышу, что векторный поиск это слабое место и вчерашний день, и что нас спасут только графовые системы. Нашел несколько постов и видео на эту тему. Захотелось попробовать. В статье делюсь своими впечатлениями, рефлексирую и рассказываю как воспроизвести эксперименты. Почему Ollama? Выделение вычислительных ресурсов на RAG в проекте - отдельная больная тема. Мне нужно было понять нижнюю планку. Если коротко, кое-как работает даже на 4b моделях. Причём здесь киберпанк? Очень нравится этот жанр, а ещё я люблю использовать для проверки RAG/LLM штук знакомые тексты. Для экспериментов с Microsoft GraphRAG я выбрал рассказ "Johnny Mnemonic" Уильяма Гибсона, для начала на английском.

https://habr.com/ru/articles/1014316/

#rag #graphrag #ollama #cyberpunk #gephi #litellm

MS GraphRAG, Ollama и немного киберпанка

Здравствуйте. Несколько лет глубоко погружён в тему корпоративных RAG-систем. В последнее время, как от коллег, так и от заказчика часто слышу, что векторный поиск это слабое место и вчерашний день, и...

Хабр

Attackers are getting smarter

1. double base64

2. compromise AI repo #litellm

3. compromise maintainer

4. use maintainer creds to suppress reports

5. spam the GitHub repo

6. close to no devs investigate memory issues. Just buy a 64 GB RAM Macbook and vibe

7. attackers go for low effort, because it's enough. "Oh, this got caught." Yes, right. It wasn't prevented.

8. no one uses sandboxes

9. no one uses web proxies with TLS inspection, which could catch info stealers and exfiltration. Devs hate TLS inspection. Especially when they work from home. Devs don't use socket firewalls or L7 filters for egress control. Because of the vibe.

10. EDR won't catch exfiltration, unless attackers are stupid and use curl. Every now and then, you can pretend the security tools work. But in reality, you can use Python requests or JavaScript axiom. And no EDR will detect info theft. Devs don't like EDR because it slows down file operations sometimes.

Summary: split dev and vibe env. Do not run fancy stuff in production. Use a VM. Share only the necessary keys. The #GitHub supply chain is not a safe place. GitHub doesn't do enough to fight spam bots.

Supply-Chain-Attacke auf #LiteLLM: Betroffene sollen Credentials sofort ändern | Developer https://www.heise.de/news/Supply-Chain-Attacke-auf-LiteLLM-Betroffene-sollen-Credentials-sofort-aendern-11223618.html
Supply-Chain-Attacke auf LiteLLM: Betroffene sollen Credentials sofort ändern

Es hat offenbar ein Angriff auf die Open-Source-Bibliothek zur Anbindung an LLMs stattgefunden, wodurch zwei kompromittierte Pakete Credentials stehlen können.

heise online
Open-source AI developer tool LiteLLM was compromised by credential-harvesting malware hidden in a software dependency. The project, downloaded up to 3.4 million times daily and with 40K GitHub stars, spread through compromised packages that stole login credentials. Researchers discovered the attack after the malware crashed a developer's machine. https://techcrunch.com/2026/03/26/delve-did-the-security-compliance-on-litellm-an-ai-project-hit-by-malware/ #Tech #Startup #News #AISecurity #LiteLLM
Silicon Valley's two biggest dramas have intersected: LiteLLM and Delve | TechCrunch

LiteLLM offers an AI open source project used by millions that was infected by credential harvesting malware.

TechCrunch