Supply Chain Attack Compromises litellm Package on PyPI, Exfiltrating Cloud Credentials

Summary: Trend Micro research reveals that malicious versions of the litellm package distributed via PyPI stole cloud credentials and SSH keys from environments updated after March 24, 2026.

The popular litellm Python package was compromised on PyPI, with versions 1.82.7 and 1.82.8 confirmed to contain malicious code designed to exfiltrate sensitive data. Any environment updated on or after March 24, 2026, risks having credentials that have been compromised by the attackers.

An attacker hijacked the maintainer accounts for the litellm project, bypassing standard GitHub release protocols to push compromised versions directly to PyPI. Because litellm sits between developers and nearly every major LLM endpoint, it is frequently pulled in as a dependency, allowing the payload to spread across infrastructure.

The payload acts as a sophisticated, cloud-centric stealer that executes automatically when the Python interpreter starts. It extracts AWS, GCP, and Azure configurations and queries internal cloud metadata to hijack instance roles, effectively granting unauthorized access to specific instances.

In Kubernetes environments, the attack persists if it detects a service account token, further expanding the attacker's access. To mitigate this threat, organizations should pin dependencies to cryptographic hashes and validate releases through external infrastructure to test for supply chain malware before deployment.

Key facts

  • Affected versions: litellm 1.82.7, 1.82.8
  • Stealing targets: AWS, GCP, Azure credentials
  • Breach date: March 24, 2026 onwards

Why it matters

Organizations must rotate credentials and quarantine dependencies immediately to prevent unauthorized access to cloud environments and Kubernetes clusters following this incident.

Key metrics

  • Daily downloads: 3,408,615 packages (affected package litellm on PyPI)
  • Total monthly downloads: 95 million packages (volume in the last month)
X profile@trendaisecurityhttps://x.com/trendaisecurity
Embedded content for: Supply Chain Attack Compromises litellm Package on PyPI, Exfiltrating Cloud Credentials