Crypto Times Logo Black
Google News Follow Banner
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • DeFi News
    • Blockchain News
    • Industry
  • Exclusive
  • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Podcasts
  • More
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
The Crypto TimesThe Crypto Times
  • All News
  • Market
  • Bitcoin
  • Ethereum
  • Altcoins
  • Regulations & Policies
  • Blockchain
  • DeFi
  • Industry
  • Exclusive
  • Opinion
Search
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • Blockchain
    • DeFi
    • Industry
    • Exclusive
    • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Quick Links
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
    • AI Policy
    • Sponsored & Advertorial Policy
  • Podcasts
Follow US
© 2026 By Crypto Times. All Rights Reserved.
Market News

LiteLLM Supply Chain Attack Steals 300GB Data and 500K Credentials

SlowMist’s CISO warns crypto developers to urgently check systems, rotate keys, and review logs to prevent losses like Trust Wallet’s breach.

Written By:
Kenrodgers Fabian

Reviewed By:
Dhara Chavda

Last updated: March 25, 2026 12:28 PM
Published March 25, 2026 12:28 PM
Share
Last updated: March 25, 2026 12:28 PM
Published March 25, 2026 12:28 PM
LiteLLM Supply Chain Attack Steals 300GB Data and 500K Credentials

Key Highlights

  • LiteLLM breach exposed 300GB of data and 500K credentials, showing even popular packages can be risky.
  • Malware stole SSH keys, cloud accounts, wallets, and database passwords, spreading via Python and Kubernetes.
  • Developers must remove affected versions, rotate credentials, and check for hidden backdoors immediately.

A serious security breach in LiteLLM has put about 300GB of data and 500,000 user credentials at risk. The problem started when hackers slipped malicious code into PyPI releases 1.82.7 and 1.82.8, allowing anyone who installed them to have sensitive information stolen automatically. 

SlowMist Technology’s Chief Information Security Officer, 23pds, warned cryptocurrency developers to act fast. He posted, “Please immediately verify, rotate relevant keys and credentials as soon as possible, check logs, access records, and any exposure of sensitive data to avoid severe losses similar to the Trust Wallet incident.”

🚨建议所有加密货币开发人员立即自查
有消息称,LiteLLM 漏洞攻击者已盗取约 300GB 数据,并窃取约 50 万个凭证。
请立即核查,尽快轮换相关密钥与凭证,核查日志、访问记录及敏感数据暴露情况,避免出现类似 Trust Wallet 事件的严重损失。 https://t.co/Cm9dHwlbV7

— 23pds (山哥) (@im23pds) March 25, 2026

The attack hit a wide range of sensitive data, including SSH keys, cloud accounts on AWS, GCP, and Azure, Kubernetes setups, Git credentials, environment files, shell histories, encrypted wallets, and database passwords. 

Developer Callum McMahon of FutureSearch discovered the malicious release and reported it to PyPI, while Daniel Hnyk subsequently raised a GitHub issue, bringing it to wider developer attention. The malware could also copy itself, spreading through Kubernetes clusters and leaving behind secret backdoors to maintain access.

How the malware operates

The malware carried out its attack in three main steps. First, it collected sensitive files from the infected computer. Next, it encrypted the stolen data and sent it to a remote server at https://models.litellm.cloud/. Finally, it tried to move laterally within Kubernetes environments, creating new pods that gave it full access to systems. On top of that, a bug in the malware caused a fork bomb, crashing affected machines and revealing the attack.

Commenting on X, Andrej Karpathy highlighted the danger, saying, “Every time you install any dependency you could be pulling in a poisoned package anywhere deep inside its entire dependency tree…The credentials that do get stolen in each attack can then be used to take over more accounts and compromise more packages.”

Immediate steps for developers

Developers need to check if they installed LiteLLM versions 1.82.7 or 1.82.8. If so, they should remove the affected packages, clear any cached files, and look for hidden backdoors like ~/.config/sysmon/sysmon.py. 

All credentials that might have been exposed should be changed immediately. While PyPI has quarantined the malicious package and maintainers are addressing the issue, this attack highlights just how risky supply chain attacks can be in open-source software.

The LiteLLM breach shows that even widely used software packages can carry serious risks. It highlights the need for developers to carefully manage dependencies and stay alert to potential threats.

Also Read: Dark Web, Tor, Crypto Wallets: Indian Police Begins New Cyber Training

Disclaimer: The information researched and reported by The Crypto Times is for informational purposes only and is not a substitute for professional financial advice. Investing in crypto assets involves significant risk due to market volatility. Always Do Your Own Research (DYOR) and consult with a qualified Financial Advisor before making any investment decisions.

Follow The Crypto Times on Google News to Stay Updated!      Google News
Google News Banner

TAGGED:Crypto Hack
Share This Article
Whatsapp Whatsapp LinkedIn Telegram Copy Link
Fabian is Crypto Journalist at The Crypto Times
By Kenrodgers Fabian
Follow:
Kenrodgers Fabian is a Content Writer with over 3 years of experience in crypto news, data analysis, and IT. With a degree in Health Records and Information Technology, he brings a structured and analytical approach to digital reporting. Kenrodgers focuses on delivering accurate, informative content that helps readers stay updated on the latest trends in crypto and emerging technologies.
Dhara Chavda- Crypto Research Analyst at The Crypto Times
By Dhara Chavda
Follow:
Dhara Chavda is a Content Strategist and Research Analyst with 5 years of experience in the crypto industry. She holds a Bachelor’s degree in Computer Engineering and brings a strong technical perspective to her work. Dhara specializes in DeFi, price analysis, and the core mechanics of cryptocurrencies. She also works on crypto news, including research, analysis, and assigning stories, ensuring accurate and timely coverage of key developments in the space.

Latest News

LayerZero Says “We Own That” After $292M Kelp DAO Hack, Admits Security Mistake
LayerZero Says “We Own That” After $292M Kelp DAO Hack, Admits Security Mistake
What Does Bitcoin Become in a World Questioning the Dollar?
What Does Bitcoin Become in a World Questioning the Dollar?
40+ DeFi Protocols Shut Down in 2026 Inside the $770M Hack Crisis Reshaping Crypto
40+ DeFi Protocols Shut Down in 2026: Inside the $770M Hack Crisis Reshaping Crypto
TON Leads Crypto Staking Returns as Telegram Ecosystem Expands
TON Leads Crypto Staking Returns as Telegram Ecosystem Expands
TeraWulf Earns More From AI Computing Than Bitcoin Mining in Q1
TeraWulf Earns More From AI Computing Than Bitcoin Mining in Q1

Find Us on Socials

You may also like

Stablecoins, RWAs, ETFs Fuel Crypto’s April Market Rebound: Binance

Stablecoins, RWAs, ETFs Fuel Crypto’s April Market Rebound: Binance

World Liberty Financial Launches USD1 Stablecoin Natively on Stripe-Backed Tempo L1 Blockchain

World Liberty Financial Launches USD1 Stablecoin Natively on Stripe-Backed Tempo L1 Blockchain

Switzerland Bitcoin Reserve Push Fails As Referendum Drive Ends

Switzerland Bitcoin Reserve Push Fails As Referendum Drive Ends

Taiwan Indicts TV Anchor Over USDT Linked China Spy Probe

Taiwan Indicts TV Anchor Over USDT Linked China Spy Probe

The Crypto Times Logo PNG

Providing real-time, accurate Crypto reporting. Your trusted source for Crypto News and Research.

Stay Updated

All News
Exclusive
Opinions
Learn
Podcasts

Company

About Us
Our Authors
Editorial Policy
AI Policy
Advertorial Policy

Get In Touch

Contact Us
Career

Find Us on Socials

X-twitter Linkedin Telegram Youtube Instagram

© 2026 The Crypto Times | A BITROCK TECHNOLOGIES L.L.C. Company.

DMCA.com Protection Status
  • Terms and Conditions
  • Disclaimer
  • Privacy Policy
  • Cookie policy
Do Not Sell or Share My Personal Information